Submit Search
Upload
Future of Cyber-security Economy
•
2 likes
•
270 views
Behnaz Aria
Follow
Future of Cyber-security Economy 2017-2021
Read less
Read more
Technology
Report
Share
Report
Share
1 of 15
Download now
Download to read offline
Recommended
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
Marcos Ortiz Valmaseda
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
Middle East IoT Workshop
Middle East IoT Workshop
Haider Iqbal
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Farah Baharuddin
Rpt paradigm shifts
Rpt paradigm shifts
malvvv
Rpt paradigm shifts
Rpt paradigm shifts
malvvv
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
Recommended
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
Marcos Ortiz Valmaseda
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
Middle East IoT Workshop
Middle East IoT Workshop
Haider Iqbal
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Farah Baharuddin
Rpt paradigm shifts
Rpt paradigm shifts
malvvv
Rpt paradigm shifts
Rpt paradigm shifts
malvvv
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
guest446b00
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
CyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Haltdos
Cyberpolicy laws
Cyberpolicy laws
esther_sonu
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
NME IT Security Survey 2016
NME IT Security Survey 2016
CTM360
Qrator Labs annual report 2017
Qrator Labs annual report 2017
Qrator Labs
2019 State of Cyber Security Report
2019 State of Cyber Security Report
Mohamed Zaheer Husain
BLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
ArabNet ME
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
Business inSecurity
Business inSecurity
Eboney Brown
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
Raaj Khanna
Vodqa why cybersecurity
Vodqa why cybersecurity
Dileep Bellamkonda
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cigniti Technologies Ltd
More Related Content
What's hot
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
guest446b00
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
CyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Haltdos
Cyberpolicy laws
Cyberpolicy laws
esther_sonu
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
NME IT Security Survey 2016
NME IT Security Survey 2016
CTM360
Qrator Labs annual report 2017
Qrator Labs annual report 2017
Qrator Labs
2019 State of Cyber Security Report
2019 State of Cyber Security Report
Mohamed Zaheer Husain
BLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
ArabNet ME
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
Business inSecurity
Business inSecurity
Eboney Brown
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
Raaj Khanna
Vodqa why cybersecurity
Vodqa why cybersecurity
Dileep Bellamkonda
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
What's hot
(20)
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 - 2022)
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
CyberSecurity.pptx
CyberSecurity.pptx
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Cyberpolicy laws
Cyberpolicy laws
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
NME IT Security Survey 2016
NME IT Security Survey 2016
Qrator Labs annual report 2017
Qrator Labs annual report 2017
2019 State of Cyber Security Report
2019 State of Cyber Security Report
BLURRING BOUNDARIES
BLURRING BOUNDARIES
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Business inSecurity
Business inSecurity
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
Vodqa why cybersecurity
Vodqa why cybersecurity
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Similar to Future of Cyber-security Economy
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cigniti Technologies Ltd
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
Daxue Consulting
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
5 main trends in cyber security for 2020
5 main trends in cyber security for 2020
Agnieszka Guźniczak-Beim
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
SG Analytics
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
Haltdos
Cybersecurity infographic
Cybersecurity infographic
Gabe Schurman
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
Dharmendra Rama
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
Cyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
SparkCognition
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
PECB
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey4
Similar to Future of Cyber-security Economy
(20)
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
5 main trends in cyber security for 2020
5 main trends in cyber security for 2020
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
Cybersecurity infographic
Cybersecurity infographic
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Cyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Recently uploaded
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Recently uploaded
(20)
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Future of Cyber-security Economy
1.
1 www.Kahkeshan.com Future of Cybersecurity Economy • Behnaz
Aria • VP,EDU Manager • PhD, MBA MCSA , Master CIW , CTT+,CRISC ISO 27001 ,ISO 22301 Lead Auditor ISO 20000 Auditor ITIL V3.0 Specialist, ITIL V2.0 Service Manager www.Kahkeshan.com
2.
2 © Behnaz Aria
2017 © Behnaz Aria 2017
3.
3 Advanced Persistent Threat:
APT Advanced Persistent Threat © Behnaz Aria 2017 Targets of APT Political Economic Technical Military © Behnaz Aria 2017
4.
4 Drone Hacking
Mobile threats Ransomware Attacks Vulnerability exploits Hardware and firmware threats IoT malware Machine learning : social engineering attacks Hacktivists: privacy issues Cyber espionage: industry and law enforcement Smart Medical Devices and Electronic Medical Records Critical Infrastructure cyber attacks Cloud computing providers infection © Behnaz Aria 2017 In 2004, the global cybersecurity market was worth $3.5 billion By 2017 it will be worth at least 35X that amount! © Behnaz Aria 2017
5.
5 Many of
the problems plaguing cybersecurity are economic in nature © Behnaz Aria 2017 Decision makers in industry and government refusing to take necessary protections because data explaining the magnitude and nature of the most significant threats just isn’t there. © Behnaz Aria 2017
6.
6 Top 15 statistics
in: © Behnaz Aria 2017 CYBERCRIME © Behnaz Aria 2017
7.
7 SPENDING © Behnaz Aria
2017 JOBS © Behnaz Aria 2017
8.
8 UNEMPLOYMENT There are
1 million cybersecurity job openings in 2017, and that is projected to exceed 1.5 million by 2019. The bobs gap creates opportunity for a more diverse workforce - a chance for women and minorities to enter the trillion dollar cybersecurity field. © Behnaz Aria 2017 TRAINING The security awareness training market is predicted to reach $10 billion annually by 2027. Training employees how to recognize and defend against cyber attacks is the most underspent sector of the cybersecurity industry. © Behnaz Aria 2017
9.
9 HEALTHCARE Global healthcare
cybersecurity spending is predicted to exceed $65 billion cumulatively over the next five years, from 2017 to 2021. As the healthcare industry continues digitizing all of its information, it continues to attract more attention from cybercriminals. This dynamic will be one of many contributors to the growth of the healthcare security market over the next decade. © Behnaz Aria 2017 RANSOMWARE Ransomware attacks on healthcare are predicted to quadruple by 2020. The biggest cyber threat facing healthcare providers:ransomware © Behnaz Aria 2017
10.
10 IDENTITY 300 billion
passwords will require cyber protection by 2021. The tally includes 100 million human passwords, and 200 million machine (Internet of Things) passwords. Some experts venture the number of passwords may grow even larger than the recent forecast. © Behnaz Aria 2017 MOBILE Wi-Fi and mobile devices are predicted to account for nearly 80 percent of IP traffic by 2025. Wi-Fi and mobile devices will account for 66 percent of IP traffic by 2020, up from 48% in 2015, according to Cisco. The shifting traffic landscape will require CISOs and IT security teams to devote more resources to mobile security. © Behnaz Aria 2017
11.
11 EXPLOITS Zero-day exploits
will rise from one-per-week in 2015 to one-per-day by 2021. Although strides are being made to produce more secure code through the use of automation and better tools, the sheer volume of code being produced is enormous. And it’s only going to grow exponentially to meet the thirst for software for web applications, mobile hardware and devices connected to the Internet of Things. © Behnaz Aria 2017 CODE 111 billion lines of new software code will be created - and needs to be secured - in 2017. IT security teams and developers are challenged to keep up with the rapidly expanding application attack surface - which is being fueled by a massively expanding mobile and web app economy. © Behnaz Aria 2017
12.
12 HUMANS 4 billion
people are expected to be online - and need cyber protection - by 2020, up from 2 billion plus last year. By 2030 the human attack surface might equal the world's population, which is projected to reach 8.5 billion by then, up from 7 billion now. © Behnaz Aria 2017 CYBER-ATTACKS Nearly half of all cyber-attacks are committed against small businesses. Small businesses — who don’t train their employees on security risks — are susceptible to the Business Email Compromise scam (BEC), which the FBI says has led to over $3 billion in losses. © Behnaz Aria 2017
13.
13 HACKERS 65 percent
of respondents to a poll say black-hat hackers are more experienced than white-hats. Black-hats are motivated by money, espionage, notoriety, and malicious intent… and they are faster, more daring, and more experienced than white hats who are constrained by boundaries and rules. © Behnaz Aria 2017 The existence of an information asymmetry does not necessarily mean that society is not investing enough in security nor that too much money is being allocated. Rather, it simply means that we are likely not investing in the right defenses to the ideal proportion! © Behnaz Aria 2017
14.
14 An economic
perspective is essential for understanding the state of cybersecurity today, as well as how to improve it moving forward. Raise awareness to cybersecurity issues and assign responsibility for action within the private sector so that the risks to society may be mitigated. © Behnaz Aria 2017 © Behnaz Aria 2017
15.
15 edu@Kahkeshan.com © Behnaz Aria
2017 behnazaria Source: csoonline.com isaca.org آﻣﻮزش ﺧﻮش ﺗﺠﺮﺑﻪ
Download now