SlideShare a Scribd company logo
INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS
2 18
A Look Back At
“IN JANUARY, IT WAS REVEALED THAT RESEARCHERS
COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S.
MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE
FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE
REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL
AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES.
…PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT
CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A
DIRECT IMPACT ON NATIONAL SECURITY.”
-Justin Sherman
Cybersecurity Fellow
“ENORMOUS PROGRESS WAS
MADE TOWARDS GETTING
MULTI-FACTOR AUTHENTICATION
THE RECOGNITION IT DESERVES.
THEN, IT WAS DASHED TO
PIECES BY THE RECENT AZURE
2FA FAILURES… I WILL
PROBABLY SPEND 2019 TRYING
TO RECONCILE THIS. I HOPE
THAT THE 2FA ENGINEERS CAN
MAKE THIS FAILURE A DISTANT
MEMORY.” -Bob Covello
IT SECURITY DIRECTOR
“FROM POORLY CONFIGURED APPS, TO
AWARD PORTALS AND BREACHES OF
INFRASTRUCTURE, THE [airline] INDUSTRY
HAS BEEN GIVEN A WAKE-UP CALL.
DATA SECURITY IS A RESPONSIBILITY–
AS IMPORTANT AS MAINTAINING AN
AIRCRAFT IS MAINTAINING THE PRIVACY
OF THE PASSENGER.”
-Christopher Burgess
Cybersecurity ADVISOR
“UNLESS YOU ARE OF A PARTICULARLY GEEKY
PERSUASION, MOST FIRMWARE UPDATES LIKELY
PASS YOU BY. SPECTRE SHOWED THE WORLD THAT
HARDWARE-RELATED EXPLOITS WERE REAL, AND IT
HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO
HIGHLIGHTED THE CHALLENGE OF PATCHING
HARDWARE AND ITS IMPACT.”
-Chris Hudson
PROFESSIONAL SERVICES
CONSULANT
“THE SINGLE, MOST MEMORABLE EVENT WAS THE
MASSIVE FERVOR OVER MELTDOWN AND SPECTRE…
TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF
ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL
THREATS AND WHAT WE PERCEIVE TO BE THREATS…
OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED
BY THE OUTPUT OF VENDORS, EVENTS AND
RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS
AND VICTIM EXPERIENCES.”
-aDRIAN SANABRIA
VP, STRATEGY & PRODUCT MARKETING
“WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND
TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND
TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER
COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS,
INCLUDING CONSUMERS. THAT CUMULATIVE WAVE
[AGAINST] INFRINGEMENT OF HUMAN RIGHTS
HAS DONE MORE TO DRIVE ATTENTION
TO SECURITY AND DATA PROTECTION
THAN ANYTHING BEFORE.”
-Sarah Clarke
Security grc specialist
“SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT
IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE
CITY OF ATLANTA AND MANY HOSPITALS AROUND THE
WORLD HAVE BEEN AMONGST ITS VICTIMS. NO
DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM-
ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF,
SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB
FOR ABOUT $750.”
-kim crawley
Cybersecurity writer
“FOR SO LONG, THE CONVENIENCE OF
SMARTPHONES, SOCIAL MEDIA, DIGITAL
ACCESS, ETC. HAS ECLIPSED CONCERNS
ABOUT PERSONAL PRIVACY AND
CORPORATE MARKETING.
COMBINE THE RECENT CONTROVERSIES
AROUND FAKE NEWS, POLITICAL
ADVERTISING AND CAMPAIGNING WITH
THE SEPT. FACEBOOK BREACH, AND WE
MAY HAVE REACH AN INFLECTION POINT.”
-MARIBETH PUSIESKI
ACCOUNT EXECUTIVE
“BEING CANADIAN IN A WORLD WHERE SECURITY
NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO
SEE OUR MANDATORY DATA BREACH NOTIFICATION
LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY
MAKES NOTIFICATION NECESSARY WHEN THERE’S A
REAL RISK OF SIGNIFICANT HARM… THERE’S STILL
A LOT THAT CANADA HAS TO DO REGARDING
CYBERSECURITY BUT, FOR NOW, IT’S A START.”
-TYLER REGULY
MANAGER, SOFTWARE DEVELOPMENT
FOR MORE INFOSEC INSIGHTS,
VISIT TRIPWIRE.COM/BLOG
WHAT’S YOUR MOST
MEMORABLE 2018 MOMENT?
TWEET US @TRIPWIREINC

More Related Content

Similar to A Look Back at 2018: The Most Memorable Cyber Moments

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
Jeremiah Grossman
 
Smart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardSmart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way Forward
Charles Reed Anderson
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
Jeremiah Grossman
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
niraj57
 
Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...
Nixu Corporation
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
Arun Prasaath
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
Brad Deflin
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
Ammar WK
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Securicon
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
UNITEC
 
Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016
Karim Baïna
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
meritnorthwest
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Pukhraj Singh
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013
Kappa Data
 

Similar to A Look Back at 2018: The Most Memorable Cyber Moments (20)

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Smart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardSmart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way Forward
 
GARRIE.REEVES.37.5
GARRIE.REEVES.37.5GARRIE.REEVES.37.5
GARRIE.REEVES.37.5
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
 
Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
 
Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Tripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
Tripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Tripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Tripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
Tripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
Tripwire
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Tripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

A Look Back at 2018: The Most Memorable Cyber Moments

  • 1. INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS 2 18 A Look Back At
  • 2. “IN JANUARY, IT WAS REVEALED THAT RESEARCHERS COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S. MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES. …PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A DIRECT IMPACT ON NATIONAL SECURITY.” -Justin Sherman Cybersecurity Fellow
  • 3. “ENORMOUS PROGRESS WAS MADE TOWARDS GETTING MULTI-FACTOR AUTHENTICATION THE RECOGNITION IT DESERVES. THEN, IT WAS DASHED TO PIECES BY THE RECENT AZURE 2FA FAILURES… I WILL PROBABLY SPEND 2019 TRYING TO RECONCILE THIS. I HOPE THAT THE 2FA ENGINEERS CAN MAKE THIS FAILURE A DISTANT MEMORY.” -Bob Covello IT SECURITY DIRECTOR
  • 4. “FROM POORLY CONFIGURED APPS, TO AWARD PORTALS AND BREACHES OF INFRASTRUCTURE, THE [airline] INDUSTRY HAS BEEN GIVEN A WAKE-UP CALL. DATA SECURITY IS A RESPONSIBILITY– AS IMPORTANT AS MAINTAINING AN AIRCRAFT IS MAINTAINING THE PRIVACY OF THE PASSENGER.” -Christopher Burgess Cybersecurity ADVISOR
  • 5. “UNLESS YOU ARE OF A PARTICULARLY GEEKY PERSUASION, MOST FIRMWARE UPDATES LIKELY PASS YOU BY. SPECTRE SHOWED THE WORLD THAT HARDWARE-RELATED EXPLOITS WERE REAL, AND IT HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO HIGHLIGHTED THE CHALLENGE OF PATCHING HARDWARE AND ITS IMPACT.” -Chris Hudson PROFESSIONAL SERVICES CONSULANT
  • 6. “THE SINGLE, MOST MEMORABLE EVENT WAS THE MASSIVE FERVOR OVER MELTDOWN AND SPECTRE… TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL THREATS AND WHAT WE PERCEIVE TO BE THREATS… OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED BY THE OUTPUT OF VENDORS, EVENTS AND RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS AND VICTIM EXPERIENCES.” -aDRIAN SANABRIA VP, STRATEGY & PRODUCT MARKETING
  • 7. “WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS, INCLUDING CONSUMERS. THAT CUMULATIVE WAVE [AGAINST] INFRINGEMENT OF HUMAN RIGHTS HAS DONE MORE TO DRIVE ATTENTION TO SECURITY AND DATA PROTECTION THAN ANYTHING BEFORE.” -Sarah Clarke Security grc specialist
  • 8. “SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE CITY OF ATLANTA AND MANY HOSPITALS AROUND THE WORLD HAVE BEEN AMONGST ITS VICTIMS. NO DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM- ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF, SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB FOR ABOUT $750.” -kim crawley Cybersecurity writer
  • 9. “FOR SO LONG, THE CONVENIENCE OF SMARTPHONES, SOCIAL MEDIA, DIGITAL ACCESS, ETC. HAS ECLIPSED CONCERNS ABOUT PERSONAL PRIVACY AND CORPORATE MARKETING. COMBINE THE RECENT CONTROVERSIES AROUND FAKE NEWS, POLITICAL ADVERTISING AND CAMPAIGNING WITH THE SEPT. FACEBOOK BREACH, AND WE MAY HAVE REACH AN INFLECTION POINT.” -MARIBETH PUSIESKI ACCOUNT EXECUTIVE
  • 10. “BEING CANADIAN IN A WORLD WHERE SECURITY NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO SEE OUR MANDATORY DATA BREACH NOTIFICATION LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY MAKES NOTIFICATION NECESSARY WHEN THERE’S A REAL RISK OF SIGNIFICANT HARM… THERE’S STILL A LOT THAT CANADA HAS TO DO REGARDING CYBERSECURITY BUT, FOR NOW, IT’S A START.” -TYLER REGULY MANAGER, SOFTWARE DEVELOPMENT
  • 11. FOR MORE INFOSEC INSIGHTS, VISIT TRIPWIRE.COM/BLOG WHAT’S YOUR MOST MEMORABLE 2018 MOMENT? TWEET US @TRIPWIREINC