SlideShare a Scribd company logo
Phishing Attacks and
Trends in Cloud
Computing
Scott Raba
Phishing Attacks
The Why, the Who, the How, and What to Do About Them
3
Why Talk About Phishing Attacks
• Is it money?
• $500 million lost
• Is it volume?
• 40.9%
• Is it craftiness?
• HTTPS, think again!
• Or is it all of the above?
• Must be aware of new tricks and methods
4
The Who
• Software as a Service (SaaS)
• Office 365, G Suite
• Single Sign On
• Financial Institutions
• Money talks
• 80% of attacks target 5 industries
• SaaS
• Financial
• Email
• Cloud
• Payment Services
5
The How
• Email
• Oldie, but a goodie
• Messaging Apps
• Facebook Messenger, Slack,
Teams
• Same MO, different attack vector
• BEC (Business Email Compromise)
• Have a dialogue
• Shared File
• Weakness in sharing service
security
6
What to do
• Over 90% of breaches started with a simple click
• Educate
• Weakest link is the human element
• Multi-Factor Authentication
• Layer your security
• Second Guess
• Follow-up through secondary method
• Trust Nothing
• Be suspicious and always ask
7
Cloud Computing
Trends for 2019
Spending, Service,
Security, and Superiority
8
Spending on Cloud
Computing
• $200 billion expected spending
in 2019
• 20% increase in spending
from 2018
• 80% of organizations with
some form of cloud adoption
by 2025
• Cost optimization is the #1
priority for businesses
9
Becoming a
Service Provider
Options, Pricing, Nimbleness
01
Focus on Applications and Data
02
Adapt to Specific Industries
03
Win, Win, Win
04
10
Security
INHIBITOR
• Security has been
the biggest inhibitor
of cloud adoption
• Properly configured
= layered defense =
security
VIGILANCE
• Security protocols
• Privacy protocols
• Governance
requirements
PERIMETER
• Software defined
• Dynamic
deployment and
service isolation
11
Superiority
AWS, Azure, Google, IBM
Acquisition and Merger
Winning Scenario for Businesses
Customer Satisfaction
LEARN MORE AT WWW.MINDSPOUT.COM
SCOTT RABA
Co-Founder & Chief Technology Officer

More Related Content

Similar to Phishing Attacks and Trends in Cloud Computing

NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
New England Direct Marketing Association, Inc.
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
Donald Malloy
 
Enterprise Social Media Boot Camp Vancouver June 19 2013
Enterprise Social Media Boot Camp Vancouver June 19 2013Enterprise Social Media Boot Camp Vancouver June 19 2013
Enterprise Social Media Boot Camp Vancouver June 19 2013
Shane Gibson
 
How Can Texting Increase Attendance
How Can Texting  Increase Attendance How Can Texting  Increase Attendance
How Can Texting Increase Attendance
gjhassin
 
Demystifying email deliverability
Demystifying email deliverabilityDemystifying email deliverability
Demystifying email deliverability
NetGains Technologies Pvt. Ltd.
 
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
Alan Quayle
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
Jarrod Overson
 
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon CleaverMillenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
Jeremy Ott
 
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
Mark Stiles
 
How can Texting Improve Training & Learning Retention?
How can Texting Improve Training & Learning Retention?How can Texting Improve Training & Learning Retention?
How can Texting Improve Training & Learning Retention?
gjhassin
 
A look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit TechnologyA look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit Technology
Community IT Innovators
 
How Texting is the Key to More Donor Engagement this Giving Tuesday.
How Texting is the Key to More Donor Engagement this Giving Tuesday.How Texting is the Key to More Donor Engagement this Giving Tuesday.
How Texting is the Key to More Donor Engagement this Giving Tuesday.
gjhassin
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
Ahmed Musaad
 
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLCPanel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
TechSoup
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia
 
Leveraging Communications Technology in Recruitment & Staffing
Leveraging Communications Technology in Recruitment & StaffingLeveraging Communications Technology in Recruitment & Staffing
Leveraging Communications Technology in Recruitment & Staffing
TALiNT Partners
 
Email marketing roadshow cambridge
Email marketing roadshow cambridgeEmail marketing roadshow cambridge
Email marketing roadshow cambridge
little green plane
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Joshua Kamdjou
 

Similar to Phishing Attacks and Trends in Cloud Computing (20)

NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Enterprise Social Media Boot Camp Vancouver June 19 2013
Enterprise Social Media Boot Camp Vancouver June 19 2013Enterprise Social Media Boot Camp Vancouver June 19 2013
Enterprise Social Media Boot Camp Vancouver June 19 2013
 
How Can Texting Increase Attendance
How Can Texting  Increase Attendance How Can Texting  Increase Attendance
How Can Texting Increase Attendance
 
Demystifying email deliverability
Demystifying email deliverabilityDemystifying email deliverability
Demystifying email deliverability
 
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
Will Conversational Interfaces Eat Telecoms? Paul Sweeney, TADSummit 2018
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
 
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon CleaverMillenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
Millenials, Messaging and Recruiting: Opportunity, or Risk? - Simon Cleaver
 
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
2019 Sitecore Symposium Connect With Your Audience in a Whole New Way
 
How can Texting Improve Training & Learning Retention?
How can Texting Improve Training & Learning Retention?How can Texting Improve Training & Learning Retention?
How can Texting Improve Training & Learning Retention?
 
A look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit TechnologyA look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit Technology
 
How Texting is the Key to More Donor Engagement this Giving Tuesday.
How Texting is the Key to More Donor Engagement this Giving Tuesday.How Texting is the Key to More Donor Engagement this Giving Tuesday.
How Texting is the Key to More Donor Engagement this Giving Tuesday.
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLCPanel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
Panel - Digital Marketing Trends - Chad Illa-Petersen, The Story Catcher LLC
 
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Leveraging Communications Technology in Recruitment & Staffing
Leveraging Communications Technology in Recruitment & StaffingLeveraging Communications Technology in Recruitment & Staffing
Leveraging Communications Technology in Recruitment & Staffing
 
Email marketing roadshow cambridge
Email marketing roadshow cambridgeEmail marketing roadshow cambridge
Email marketing roadshow cambridge
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
 

More from InterCon

Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
InterCon
 
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
InterCon
 
Transitioning Your Business Model - From Services To Subscriptions: Presented...
Transitioning Your Business Model - From Services To Subscriptions: Presented...Transitioning Your Business Model - From Services To Subscriptions: Presented...
Transitioning Your Business Model - From Services To Subscriptions: Presented...
InterCon
 
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
InterCon
 
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
InterCon
 
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
InterCon
 
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
InterCon
 
5G Technology - The Future of Internet
5G Technology - The Future of Internet5G Technology - The Future of Internet
5G Technology - The Future of Internet
InterCon
 
Software Security For DevOps And Continuous Deployment In The Cloud
Software Security For DevOps And Continuous Deployment In The CloudSoftware Security For DevOps And Continuous Deployment In The Cloud
Software Security For DevOps And Continuous Deployment In The Cloud
InterCon
 
Transitioning Your Business Model - From Services To SaaS
Transitioning Your Business Model - From Services To SaaSTransitioning Your Business Model - From Services To SaaS
Transitioning Your Business Model - From Services To SaaS
InterCon
 
ML Will Redesign, Not Replace, Jobs
ML Will Redesign, Not Replace, JobsML Will Redesign, Not Replace, Jobs
ML Will Redesign, Not Replace, Jobs
InterCon
 
Blockchain Applications Transforming Society
Blockchain Applications Transforming SocietyBlockchain Applications Transforming Society
Blockchain Applications Transforming Society
InterCon
 
How Are AI And ML Transforming Decision Making?
How Are AI And ML Transforming Decision Making?How Are AI And ML Transforming Decision Making?
How Are AI And ML Transforming Decision Making?
InterCon
 
Boosting App Installs
Boosting App InstallsBoosting App Installs
Boosting App Installs
InterCon
 
Blockchain, Smart Contracts & IoT
Blockchain, Smart Contracts & IoTBlockchain, Smart Contracts & IoT
Blockchain, Smart Contracts & IoT
InterCon
 
Deep Reinforcement Leaning In Machine Learning
Deep Reinforcement Leaning In Machine LearningDeep Reinforcement Leaning In Machine Learning
Deep Reinforcement Leaning In Machine Learning
InterCon
 
IoT - Understanding The Shift To Edge Computing
IoT - Understanding The Shift To Edge ComputingIoT - Understanding The Shift To Edge Computing
IoT - Understanding The Shift To Edge Computing
InterCon
 
IoT Data - Like No Data We have Ever Seen
IoT Data - Like No Data We have Ever SeenIoT Data - Like No Data We have Ever Seen
IoT Data - Like No Data We have Ever Seen
InterCon
 

More from InterCon (18)

Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...
 
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
Cross Border Blockchain Equity/Capital Market Services And Compliance: Presen...
 
Transitioning Your Business Model - From Services To Subscriptions: Presented...
Transitioning Your Business Model - From Services To Subscriptions: Presented...Transitioning Your Business Model - From Services To Subscriptions: Presented...
Transitioning Your Business Model - From Services To Subscriptions: Presented...
 
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
IoT Now And In The Future: Presented by Niroshan Madampitige, Head of Deliver...
 
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
Data is the New Oil: Presented By Naveen Narayanan, Global Client Partner of ...
 
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
Can Blockchain Disrupt Or Even Destroy The Cloud? : Presented by Suhas Patil,...
 
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
E-Commerce Automation: Presented by Siddhartha Choudhary, Co-Founder & CEO of...
 
5G Technology - The Future of Internet
5G Technology - The Future of Internet5G Technology - The Future of Internet
5G Technology - The Future of Internet
 
Software Security For DevOps And Continuous Deployment In The Cloud
Software Security For DevOps And Continuous Deployment In The CloudSoftware Security For DevOps And Continuous Deployment In The Cloud
Software Security For DevOps And Continuous Deployment In The Cloud
 
Transitioning Your Business Model - From Services To SaaS
Transitioning Your Business Model - From Services To SaaSTransitioning Your Business Model - From Services To SaaS
Transitioning Your Business Model - From Services To SaaS
 
ML Will Redesign, Not Replace, Jobs
ML Will Redesign, Not Replace, JobsML Will Redesign, Not Replace, Jobs
ML Will Redesign, Not Replace, Jobs
 
Blockchain Applications Transforming Society
Blockchain Applications Transforming SocietyBlockchain Applications Transforming Society
Blockchain Applications Transforming Society
 
How Are AI And ML Transforming Decision Making?
How Are AI And ML Transforming Decision Making?How Are AI And ML Transforming Decision Making?
How Are AI And ML Transforming Decision Making?
 
Boosting App Installs
Boosting App InstallsBoosting App Installs
Boosting App Installs
 
Blockchain, Smart Contracts & IoT
Blockchain, Smart Contracts & IoTBlockchain, Smart Contracts & IoT
Blockchain, Smart Contracts & IoT
 
Deep Reinforcement Leaning In Machine Learning
Deep Reinforcement Leaning In Machine LearningDeep Reinforcement Leaning In Machine Learning
Deep Reinforcement Leaning In Machine Learning
 
IoT - Understanding The Shift To Edge Computing
IoT - Understanding The Shift To Edge ComputingIoT - Understanding The Shift To Edge Computing
IoT - Understanding The Shift To Edge Computing
 
IoT Data - Like No Data We have Ever Seen
IoT Data - Like No Data We have Ever SeenIoT Data - Like No Data We have Ever Seen
IoT Data - Like No Data We have Ever Seen
 

Recently uploaded

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 

Recently uploaded (20)

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 

Phishing Attacks and Trends in Cloud Computing

  • 1. Phishing Attacks and Trends in Cloud Computing Scott Raba
  • 2. Phishing Attacks The Why, the Who, the How, and What to Do About Them
  • 3. 3 Why Talk About Phishing Attacks • Is it money? • $500 million lost • Is it volume? • 40.9% • Is it craftiness? • HTTPS, think again! • Or is it all of the above? • Must be aware of new tricks and methods
  • 4. 4 The Who • Software as a Service (SaaS) • Office 365, G Suite • Single Sign On • Financial Institutions • Money talks • 80% of attacks target 5 industries • SaaS • Financial • Email • Cloud • Payment Services
  • 5. 5 The How • Email • Oldie, but a goodie • Messaging Apps • Facebook Messenger, Slack, Teams • Same MO, different attack vector • BEC (Business Email Compromise) • Have a dialogue • Shared File • Weakness in sharing service security
  • 6. 6 What to do • Over 90% of breaches started with a simple click • Educate • Weakest link is the human element • Multi-Factor Authentication • Layer your security • Second Guess • Follow-up through secondary method • Trust Nothing • Be suspicious and always ask
  • 7. 7 Cloud Computing Trends for 2019 Spending, Service, Security, and Superiority
  • 8. 8 Spending on Cloud Computing • $200 billion expected spending in 2019 • 20% increase in spending from 2018 • 80% of organizations with some form of cloud adoption by 2025 • Cost optimization is the #1 priority for businesses
  • 9. 9 Becoming a Service Provider Options, Pricing, Nimbleness 01 Focus on Applications and Data 02 Adapt to Specific Industries 03 Win, Win, Win 04
  • 10. 10 Security INHIBITOR • Security has been the biggest inhibitor of cloud adoption • Properly configured = layered defense = security VIGILANCE • Security protocols • Privacy protocols • Governance requirements PERIMETER • Software defined • Dynamic deployment and service isolation
  • 11. 11 Superiority AWS, Azure, Google, IBM Acquisition and Merger Winning Scenario for Businesses Customer Satisfaction
  • 12. LEARN MORE AT WWW.MINDSPOUT.COM SCOTT RABA Co-Founder & Chief Technology Officer