SlideShare a Scribd company logo
A Brave New World - An Exploratory
Look Into The Future of Hacking and
Cybercrime Tactics
Tyler Wrightson
CEP, Leet Security
Nick Cavalancia
4-time Microsoft Cloud and Datacenter MVP, CEO of Conversational Geek
Kurt Abrahams
CMO, MSP360
1
1
Today’s Speakers
2
Nick Cavalancia
Nick Cavalancia is a 4-time Microsoft Cloud and Datacenter MVP, has over 28 years of enterprise IT
experience, is a former MSP owner, is an accomplished consultant, speaker, trainer, writer, and
columnist, and regularly speaks, writes, and blogs for some of the most recognized tech companies
today on topics including cybersecurity, cloud adoption, business continuity, and compliance.
Tyler Wrightson
Tyler Wrightson is The Founder of Leet Cyber Security and holds numerous industry certifications,
including CISSP, CCSP, CCNA, CCDA, and MCSE, and he has taught classes for CCNA certification,
wireless security, and network security.
Kurt Abrahams
Kurt Abrahams has held several leadership positions in marketing at various B2B technology
companies over the past 15 years. Prior to MSP360, he spent several years at one of the largest MSP
software providers in the world, where he oversaw an international team of marketers managing the
brand, content and digital marketing efforts in the IT channel.
Agenda
● How do modern threat technologies impact the
safety and security of humans?
● What will ransomware, malware, extortion, and
kinetic attacks look like in the future?
● What can you do to protect your business or your
clients from the latest attack methods?
3
Tyler Wrightson
● The Founder of Leet Cyber Security
● CISSP, CCSP, CCNA, CCDA, and MCSE
● Cybersecurity Trainer
● Founder of ANYCon
● Cybersecurity industry speaker
● Author of Advanced Persistent Threat
Hacking and Wireless Network
Security: A Beginner’s Guide
4
leetcybersecurity.com
The impact of modern threat tech
● What tech should we be most concerned about today?
● Who’s at risk of attack?
● How easy is it for the “everycriminal” to get their hands on this tech?
● What’s the immediate impact of this accessible evolving tech on
organizations?
5
What will attacks look like in the future?
● Next 6-12 months?
● Next decade?
● Beyond?
6
Protecting your business and customers
● What are the high-level practical best practices?
● What about some ”in the weeds” guidance?
● What about “tomorrow”?
7
QUESTIONS?
8
8
Manage. Support. Protect.

More Related Content

Similar to A Brave New World - An Exploratory Look Into The Future of Hacking and Cybercrime Tactics

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
Vishal Singh
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
Microsoft India
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
Richard Emrich
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
Andy Kim
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
Insights success media and technology pvt ltd
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Symptai Consulting Limited
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
Nakhoudah
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
hamzarajpoot33
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
Merry D'souza
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success media and technology pvt ltd
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
Insights success media and technology pvt ltd
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potx
Puneet Kukreja
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele
 

Similar to A Brave New World - An Exploratory Look Into The Future of Hacking and Cybercrime Tactics (20)

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potx
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security Expert
 

More from MSP360

Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360
MSP360
 
Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + Wasabi
MSP360
 
Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024
MSP360
 
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALWebinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
MSP360
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
MSP360
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
MSP360
 
Getting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesGetting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best Practices
MSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
MSP360
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational Institutions
MSP360
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
MSP360
 
Getting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxGetting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptx
MSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
MSP360
 
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
MSP360
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
MSP360
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
MSP360
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?
MSP360
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
MSP360
 

More from MSP360 (20)

Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360
 
Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + Wasabi
 
Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024
 
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALWebinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
 
Getting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesGetting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best Practices
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational Institutions
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
 
Getting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxGetting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptx
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
 
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

A Brave New World - An Exploratory Look Into The Future of Hacking and Cybercrime Tactics

  • 1. A Brave New World - An Exploratory Look Into The Future of Hacking and Cybercrime Tactics Tyler Wrightson CEP, Leet Security Nick Cavalancia 4-time Microsoft Cloud and Datacenter MVP, CEO of Conversational Geek Kurt Abrahams CMO, MSP360 1 1
  • 2. Today’s Speakers 2 Nick Cavalancia Nick Cavalancia is a 4-time Microsoft Cloud and Datacenter MVP, has over 28 years of enterprise IT experience, is a former MSP owner, is an accomplished consultant, speaker, trainer, writer, and columnist, and regularly speaks, writes, and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance. Tyler Wrightson Tyler Wrightson is The Founder of Leet Cyber Security and holds numerous industry certifications, including CISSP, CCSP, CCNA, CCDA, and MCSE, and he has taught classes for CCNA certification, wireless security, and network security. Kurt Abrahams Kurt Abrahams has held several leadership positions in marketing at various B2B technology companies over the past 15 years. Prior to MSP360, he spent several years at one of the largest MSP software providers in the world, where he oversaw an international team of marketers managing the brand, content and digital marketing efforts in the IT channel.
  • 3. Agenda ● How do modern threat technologies impact the safety and security of humans? ● What will ransomware, malware, extortion, and kinetic attacks look like in the future? ● What can you do to protect your business or your clients from the latest attack methods? 3
  • 4. Tyler Wrightson ● The Founder of Leet Cyber Security ● CISSP, CCSP, CCNA, CCDA, and MCSE ● Cybersecurity Trainer ● Founder of ANYCon ● Cybersecurity industry speaker ● Author of Advanced Persistent Threat Hacking and Wireless Network Security: A Beginner’s Guide 4 leetcybersecurity.com
  • 5. The impact of modern threat tech ● What tech should we be most concerned about today? ● Who’s at risk of attack? ● How easy is it for the “everycriminal” to get their hands on this tech? ● What’s the immediate impact of this accessible evolving tech on organizations? 5
  • 6. What will attacks look like in the future? ● Next 6-12 months? ● Next decade? ● Beyond? 6
  • 7. Protecting your business and customers ● What are the high-level practical best practices? ● What about some ”in the weeds” guidance? ● What about “tomorrow”? 7