SlideShare a Scribd company logo
1 of 5
Download to read offline
06.08.21
POST PANDEMIC
THREAT SCENARIO
ANCHISES MORAES
@anchisesbr
@c6bank
06.08.21
Photo:
Wikipedia
“NEW NORMAL”
For Business
Credit recovery
Hyper consumism
Online services
Mental healthy concerns
E-commerce adoption
New workforce
Remote (hybrid) work
Global workforce
New office
Space for confraternization
Fewer business trips
06.08.21
#1 Phishing offering credit and discounts
paying debits
Economic recovery
#2 E-commerce fraud
Fake promotions
Hyper consumism
#3
Targeted attacks
Spear phishing
Remote access (RDP, VPN)
Data leak from home devices
Home Office
GREATEST THREATS
Over the Next 2 Years
06.08.21
References
The Economist: “What history tells you about post-
pandemic booms”
https://www.economist.com/finance-and-economics/2021/04/29/what-history-
tells-you-about-post-pandemic-booms
The Economist: “The World In 2021”
https://www.economist.com/the-world-in-2021
TED: “Lessons from the 1918 flu”, Laurie Garrett (2007)
https://www.ted.com/talks/laurie_garrett_lessons_from_the_1918_flu
“The Next Big Divide in Finance Takes Shape in Your
Office”
https://www.bloomberg.com/news/articles/2021-07-06/the-next-big-divide-in-
finance-is-taking-shape-in-your-office
06.08.21
THANK YOU

More Related Content

Similar to Post pandemics threat scenario

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big datarmvvr143
 
Mathews_Blockchain.pdf
Mathews_Blockchain.pdfMathews_Blockchain.pdf
Mathews_Blockchain.pdfssuser08aa1b2
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016LibreCon
 
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's JobsFive Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's JobsBillKelvie
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingJeffrey Funk
 
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...Sean Manion PhD
 
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...Tasktop
 
Payment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarPayment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarAndrew Barnes
 
digital-economy-compass-2022.pdf
digital-economy-compass-2022.pdfdigital-economy-compass-2022.pdf
digital-economy-compass-2022.pdfVO Quang-Tri
 
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,JeniceStuckeyoo
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docxransayo
 

Similar to Post pandemics threat scenario (20)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big data
 
Mathews_Blockchain.pdf
Mathews_Blockchain.pdfMathews_Blockchain.pdf
Mathews_Blockchain.pdf
 
Connect X
Connect X Connect X
Connect X
 
Big Data
Big DataBig Data
Big Data
 
Business Trends Report
Business Trends ReportBusiness Trends Report
Business Trends Report
 
Mobile August 2011
Mobile   August 2011Mobile   August 2011
Mobile August 2011
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016
 
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's JobsFive Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
 
STKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO BootcampSTKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO Bootcamp
 
Ken Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the FutureKen Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the Future
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is Coming
 
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
 
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
 
Actuarial News
Actuarial NewsActuarial News
Actuarial News
 
Payment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarPayment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___Cashstar
 
digital-economy-compass-2022.pdf
digital-economy-compass-2022.pdfdigital-economy-compass-2022.pdf
digital-economy-compass-2022.pdf
 
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 

More from Anchises Moraes

Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internetAnchises Moraes
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaAnchises Moraes
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurançaAnchises Moraes
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeAnchises Moraes
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusAnchises Moraes
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4conAnchises Moraes
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurançaAnchises Moraes
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019Anchises Moraes
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do PentestAnchises Moraes
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!Anchises Moraes
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da InformaçãoAnchises Moraes
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Anchises Moraes
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaAnchises Moraes
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 

More from Anchises Moraes (20)

Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Hacker Passport Brazil
Hacker Passport BrazilHacker Passport Brazil
Hacker Passport Brazil
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Post pandemics threat scenario

  • 2. 06.08.21 Photo: Wikipedia “NEW NORMAL” For Business Credit recovery Hyper consumism Online services Mental healthy concerns E-commerce adoption New workforce Remote (hybrid) work Global workforce New office Space for confraternization Fewer business trips
  • 3. 06.08.21 #1 Phishing offering credit and discounts paying debits Economic recovery #2 E-commerce fraud Fake promotions Hyper consumism #3 Targeted attacks Spear phishing Remote access (RDP, VPN) Data leak from home devices Home Office GREATEST THREATS Over the Next 2 Years
  • 4. 06.08.21 References The Economist: “What history tells you about post- pandemic booms” https://www.economist.com/finance-and-economics/2021/04/29/what-history- tells-you-about-post-pandemic-booms The Economist: “The World In 2021” https://www.economist.com/the-world-in-2021 TED: “Lessons from the 1918 flu”, Laurie Garrett (2007) https://www.ted.com/talks/laurie_garrett_lessons_from_the_1918_flu “The Next Big Divide in Finance Takes Shape in Your Office” https://www.bloomberg.com/news/articles/2021-07-06/the-next-big-divide-in- finance-is-taking-shape-in-your-office