SlideShare a Scribd company logo
1 of 15
Download to read offline
1
www.Kahkeshan.com
Future of
Cybersecurity
Economy
• Behnaz Aria
• VP,EDU Manager
• PhD, MBA
MCSA , Master CIW , CTT+,CRISC
ISO 27001 ,ISO 22301 Lead Auditor
ISO 20000 Auditor
ITIL V3.0 Specialist, ITIL V2.0 Service Manager
www.Kahkeshan.com
2
© Behnaz Aria 2017
© Behnaz Aria 2017
3
Advanced Persistent Threat: APT
 Advanced
 Persistent
 Threat
© Behnaz Aria 2017
Targets of APT
Political
Economic
Technical
Military
© Behnaz Aria 2017
4
 Drone Hacking
 Mobile threats
 Ransomware Attacks
 Vulnerability exploits
 Hardware and firmware threats
 IoT malware
 Machine learning : social engineering attacks
 Hacktivists: privacy issues
 Cyber espionage: industry and law enforcement
 Smart Medical Devices and Electronic Medical Records
 Critical Infrastructure cyber attacks
 Cloud computing providers infection
© Behnaz Aria 2017
In 2004, the global cybersecurity market
was worth $3.5 billion
By 2017 it will be worth at least 35X
that amount!
© Behnaz Aria 2017
5
 Many of the problems plaguing
cybersecurity are economic in nature
© Behnaz Aria 2017
Decision makers in industry and
government refusing to take necessary
protections because data explaining
the magnitude and nature of the most
significant threats just isn’t there.
© Behnaz Aria 2017
6
Top 15 statistics in:
© Behnaz Aria 2017
CYBERCRIME
© Behnaz Aria 2017
7
SPENDING
© Behnaz Aria 2017
JOBS
© Behnaz Aria 2017
8
UNEMPLOYMENT
 There are 1 million cybersecurity job openings in
2017, and that is projected to exceed 1.5 million
by 2019. The bobs gap creates opportunity for a
more diverse workforce - a chance for women and
minorities to enter the trillion dollar
cybersecurity field.
© Behnaz Aria 2017
TRAINING
 The security awareness training market is
predicted to reach $10 billion annually by 2027.
Training employees how to recognize and defend
against cyber attacks is the most underspent
sector of the cybersecurity industry.
© Behnaz Aria 2017
9
HEALTHCARE
 Global healthcare cybersecurity spending is
predicted to exceed $65 billion cumulatively over
the next five years, from 2017 to 2021. As the
healthcare industry continues digitizing all of its
information, it continues to attract more
attention from cybercriminals. This dynamic will
be one of many contributors to the growth of the
healthcare security market over the next decade.
© Behnaz Aria 2017
RANSOMWARE
 Ransomware attacks on healthcare are predicted
to quadruple by 2020.
 The biggest cyber threat facing healthcare
providers:ransomware
© Behnaz Aria 2017
10
IDENTITY
 300 billion passwords will require cyber
protection by 2021. The tally includes 100 million
human passwords, and 200 million machine
(Internet of Things) passwords. Some experts
venture the number of passwords may grow even
larger than the recent forecast.
© Behnaz Aria 2017
MOBILE
 Wi-Fi and mobile devices are predicted to account
for nearly 80 percent of IP traffic by 2025. Wi-Fi
and mobile devices will account for 66 percent of
IP traffic by 2020, up from 48% in 2015, according
to Cisco. The shifting traffic landscape will
require CISOs and IT security teams to devote
more resources to mobile security.
© Behnaz Aria 2017
11
EXPLOITS
 Zero-day exploits will rise from one-per-week in
2015 to one-per-day by 2021. Although strides are
being made to produce more secure code through
the use of automation and better tools, the sheer
volume of code being produced is enormous. And
it’s only going to grow exponentially to meet the
thirst for software for web applications, mobile
hardware and devices connected to the Internet
of Things.
© Behnaz Aria 2017
CODE
 111 billion lines of new software code will be
created - and needs to be secured - in 2017. IT
security teams and developers are challenged to
keep up with the rapidly expanding application
attack surface - which is being fueled by a
massively expanding mobile and web app
economy.
© Behnaz Aria 2017
12
HUMANS
 4 billion people are expected to be online - and
need cyber protection - by 2020, up from 2 billion
plus last year. By 2030 the human attack surface
might equal the world's population, which is
projected to reach 8.5 billion by then, up from 7
billion now.
© Behnaz Aria 2017
CYBER-ATTACKS
 Nearly half of all cyber-attacks are committed
against small businesses. Small businesses — who
don’t train their employees on security risks — are
susceptible to the Business Email Compromise
scam (BEC), which the FBI says has led to over $3
billion in losses.
© Behnaz Aria 2017
13
HACKERS
 65 percent of respondents to a poll say black-hat
hackers are more experienced than white-hats.
Black-hats are motivated by money, espionage,
notoriety, and malicious intent… and they are
faster, more daring, and more experienced than
white hats who are constrained by boundaries and
rules.
© Behnaz Aria 2017
 The existence of an information asymmetry does
not necessarily mean that society is not investing
enough in security nor that too much money is
being allocated. Rather, it simply means that we
are likely not investing in the right defenses to
the ideal proportion!
© Behnaz Aria 2017
14
 An economic perspective is essential
for understanding the state of
cybersecurity today, as well as how to
improve it moving forward.
 Raise awareness to cybersecurity issues
and assign responsibility for action
within the private sector so that the
risks to society may be mitigated.
© Behnaz Aria 2017
© Behnaz Aria 2017
15
edu@Kahkeshan.com
© Behnaz Aria 2017
behnazaria
Source: csoonline.com
isaca.org
‫آﻣﻮزش‬ ‫ﺧﻮش‬ ‫ﺗﺠﺮﺑﻪ‬

More Related Content

What's hot

Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Aarkstore Enterprise
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAHaltdos
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...ArabNet ME
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurityEboney Brown
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 

What's hot (20)

Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 

Similar to Future of Cyber-security Economy

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksDaxue Consulting
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicGabe Schurman
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Cyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicCyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicSparkCognition
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 

Similar to Future of Cyber-security Economy (20)

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicCyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Future of Cyber-security Economy

  • 1. 1 www.Kahkeshan.com Future of Cybersecurity Economy • Behnaz Aria • VP,EDU Manager • PhD, MBA MCSA , Master CIW , CTT+,CRISC ISO 27001 ,ISO 22301 Lead Auditor ISO 20000 Auditor ITIL V3.0 Specialist, ITIL V2.0 Service Manager www.Kahkeshan.com
  • 2. 2 © Behnaz Aria 2017 © Behnaz Aria 2017
  • 3. 3 Advanced Persistent Threat: APT  Advanced  Persistent  Threat © Behnaz Aria 2017 Targets of APT Political Economic Technical Military © Behnaz Aria 2017
  • 4. 4  Drone Hacking  Mobile threats  Ransomware Attacks  Vulnerability exploits  Hardware and firmware threats  IoT malware  Machine learning : social engineering attacks  Hacktivists: privacy issues  Cyber espionage: industry and law enforcement  Smart Medical Devices and Electronic Medical Records  Critical Infrastructure cyber attacks  Cloud computing providers infection © Behnaz Aria 2017 In 2004, the global cybersecurity market was worth $3.5 billion By 2017 it will be worth at least 35X that amount! © Behnaz Aria 2017
  • 5. 5  Many of the problems plaguing cybersecurity are economic in nature © Behnaz Aria 2017 Decision makers in industry and government refusing to take necessary protections because data explaining the magnitude and nature of the most significant threats just isn’t there. © Behnaz Aria 2017
  • 6. 6 Top 15 statistics in: © Behnaz Aria 2017 CYBERCRIME © Behnaz Aria 2017
  • 7. 7 SPENDING © Behnaz Aria 2017 JOBS © Behnaz Aria 2017
  • 8. 8 UNEMPLOYMENT  There are 1 million cybersecurity job openings in 2017, and that is projected to exceed 1.5 million by 2019. The bobs gap creates opportunity for a more diverse workforce - a chance for women and minorities to enter the trillion dollar cybersecurity field. © Behnaz Aria 2017 TRAINING  The security awareness training market is predicted to reach $10 billion annually by 2027. Training employees how to recognize and defend against cyber attacks is the most underspent sector of the cybersecurity industry. © Behnaz Aria 2017
  • 9. 9 HEALTHCARE  Global healthcare cybersecurity spending is predicted to exceed $65 billion cumulatively over the next five years, from 2017 to 2021. As the healthcare industry continues digitizing all of its information, it continues to attract more attention from cybercriminals. This dynamic will be one of many contributors to the growth of the healthcare security market over the next decade. © Behnaz Aria 2017 RANSOMWARE  Ransomware attacks on healthcare are predicted to quadruple by 2020.  The biggest cyber threat facing healthcare providers:ransomware © Behnaz Aria 2017
  • 10. 10 IDENTITY  300 billion passwords will require cyber protection by 2021. The tally includes 100 million human passwords, and 200 million machine (Internet of Things) passwords. Some experts venture the number of passwords may grow even larger than the recent forecast. © Behnaz Aria 2017 MOBILE  Wi-Fi and mobile devices are predicted to account for nearly 80 percent of IP traffic by 2025. Wi-Fi and mobile devices will account for 66 percent of IP traffic by 2020, up from 48% in 2015, according to Cisco. The shifting traffic landscape will require CISOs and IT security teams to devote more resources to mobile security. © Behnaz Aria 2017
  • 11. 11 EXPLOITS  Zero-day exploits will rise from one-per-week in 2015 to one-per-day by 2021. Although strides are being made to produce more secure code through the use of automation and better tools, the sheer volume of code being produced is enormous. And it’s only going to grow exponentially to meet the thirst for software for web applications, mobile hardware and devices connected to the Internet of Things. © Behnaz Aria 2017 CODE  111 billion lines of new software code will be created - and needs to be secured - in 2017. IT security teams and developers are challenged to keep up with the rapidly expanding application attack surface - which is being fueled by a massively expanding mobile and web app economy. © Behnaz Aria 2017
  • 12. 12 HUMANS  4 billion people are expected to be online - and need cyber protection - by 2020, up from 2 billion plus last year. By 2030 the human attack surface might equal the world's population, which is projected to reach 8.5 billion by then, up from 7 billion now. © Behnaz Aria 2017 CYBER-ATTACKS  Nearly half of all cyber-attacks are committed against small businesses. Small businesses — who don’t train their employees on security risks — are susceptible to the Business Email Compromise scam (BEC), which the FBI says has led to over $3 billion in losses. © Behnaz Aria 2017
  • 13. 13 HACKERS  65 percent of respondents to a poll say black-hat hackers are more experienced than white-hats. Black-hats are motivated by money, espionage, notoriety, and malicious intent… and they are faster, more daring, and more experienced than white hats who are constrained by boundaries and rules. © Behnaz Aria 2017  The existence of an information asymmetry does not necessarily mean that society is not investing enough in security nor that too much money is being allocated. Rather, it simply means that we are likely not investing in the right defenses to the ideal proportion! © Behnaz Aria 2017
  • 14. 14  An economic perspective is essential for understanding the state of cybersecurity today, as well as how to improve it moving forward.  Raise awareness to cybersecurity issues and assign responsibility for action within the private sector so that the risks to society may be mitigated. © Behnaz Aria 2017 © Behnaz Aria 2017
  • 15. 15 edu@Kahkeshan.com © Behnaz Aria 2017 behnazaria Source: csoonline.com isaca.org ‫آﻣﻮزش‬ ‫ﺧﻮش‬ ‫ﺗﺠﺮﺑﻪ‬