SlideShare a Scribd company logo
06.08.21
POST PANDEMIC
THREAT SCENARIO
ANCHISES MORAES
@anchisesbr
@c6bank
06.08.21
Photo:
Wikipedia
“NEW NORMAL”
For Business
Credit recovery
Hyper consumism
Online services
Mental healthy concerns
E-commerce adoption
New workforce
Remote (hybrid) work
Global workforce
New office
Space for confraternization
Fewer business trips
06.08.21
#1 Phishing offering credit and discounts
paying debits
Economic recovery
#2 E-commerce fraud
Fake promotions
Hyper consumism
#3
Targeted attacks
Spear phishing
Remote access (RDP, VPN)
Data leak from home devices
Home Office
GREATEST THREATS
Over the Next 2 Years
06.08.21
References
The Economist: “What history tells you about post-
pandemic booms”
https://www.economist.com/finance-and-economics/2021/04/29/what-history-
tells-you-about-post-pandemic-booms
The Economist: “The World In 2021”
https://www.economist.com/the-world-in-2021
TED: “Lessons from the 1918 flu”, Laurie Garrett (2007)
https://www.ted.com/talks/laurie_garrett_lessons_from_the_1918_flu
“The Next Big Divide in Finance Takes Shape in Your
Office”
https://www.bloomberg.com/news/articles/2021-07-06/the-next-big-divide-in-
finance-is-taking-shape-in-your-office
06.08.21
THANK YOU

More Related Content

Similar to Post pandemics threat scenario

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
John ILIADIS
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big data
rmvvr143
 
Mathews_Blockchain.pdf
Mathews_Blockchain.pdfMathews_Blockchain.pdf
Mathews_Blockchain.pdf
ssuser08aa1b2
 
Connect X
Connect X Connect X
Connect X
Jonathan Alvarado
 
Big Data
Big DataBig Data
Big Data
Peter Parycek
 
Business Trends Report
Business Trends ReportBusiness Trends Report
Business Trends Report
Jezzebell Vinuela
 
Mobile August 2011
Mobile   August 2011Mobile   August 2011
Mobile August 2011
Dr. Jimmy Schwarzkopf
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016
LibreCon
 
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's JobsFive Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
BillKelvie
 
STKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO BootcampSTKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO Bootcamp
Dr. Jimmy Schwarzkopf
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is Coming
Jeffrey Funk
 
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Sean Manion PhD
 
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Tasktop
 
Actuarial News
Actuarial NewsActuarial News
Actuarial News
CasualtyActuary
 
Payment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarPayment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarAndrew Barnes
 
digital-economy-compass-2022.pdf
digital-economy-compass-2022.pdfdigital-economy-compass-2022.pdf
digital-economy-compass-2022.pdf
VO Quang-Tri
 
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
JeniceStuckeyoo
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx
ransayo
 

Similar to Post pandemics threat scenario (20)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big data
 
Mathews_Blockchain.pdf
Mathews_Blockchain.pdfMathews_Blockchain.pdf
Mathews_Blockchain.pdf
 
Connect X
Connect X Connect X
Connect X
 
Big Data
Big DataBig Data
Big Data
 
Business Trends Report
Business Trends ReportBusiness Trends Report
Business Trends Report
 
Mobile August 2011
Mobile   August 2011Mobile   August 2011
Mobile August 2011
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016
 
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's JobsFive Disruptive Technologies and Their Impact on Connecticut's Jobs
Five Disruptive Technologies and Their Impact on Connecticut's Jobs
 
STKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO BootcampSTKI 10th Annual 2010 CIO Bootcamp
STKI 10th Annual 2010 CIO Bootcamp
 
Ken Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the FutureKen Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the Future
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is Coming
 
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 13, 25 S...
 
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
Making Connections Visible: How to Defrag your Value Stream | Tasktop Connect...
 
Actuarial News
Actuarial NewsActuarial News
Actuarial News
 
Payment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___CashstarPayment Week - Andrew Barnes, Managing Director___Cashstar
Payment Week - Andrew Barnes, Managing Director___Cashstar
 
digital-economy-compass-2022.pdf
digital-economy-compass-2022.pdfdigital-economy-compass-2022.pdf
digital-economy-compass-2022.pdf
 
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
BMGT 496 - Week 6 Citations (Breuninger, 2017) (Britz,
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 

More from Anchises Moraes

Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
Anchises Moraes
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Anchises Moraes
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
Anchises Moraes
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
Anchises Moraes
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
Anchises Moraes
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
Anchises Moraes
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
Anchises Moraes
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
Anchises Moraes
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
Anchises Moraes
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
Anchises Moraes
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
Anchises Moraes
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
Anchises Moraes
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
Anchises Moraes
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
Anchises Moraes
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
Anchises Moraes
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
Anchises Moraes
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
Anchises Moraes
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
Anchises Moraes
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
Anchises Moraes
 
Hacker Passport Brazil
Hacker Passport BrazilHacker Passport Brazil
Hacker Passport Brazil
Anchises Moraes
 

More from Anchises Moraes (20)

Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Hacker Passport Brazil
Hacker Passport BrazilHacker Passport Brazil
Hacker Passport Brazil
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Post pandemics threat scenario

  • 2. 06.08.21 Photo: Wikipedia “NEW NORMAL” For Business Credit recovery Hyper consumism Online services Mental healthy concerns E-commerce adoption New workforce Remote (hybrid) work Global workforce New office Space for confraternization Fewer business trips
  • 3. 06.08.21 #1 Phishing offering credit and discounts paying debits Economic recovery #2 E-commerce fraud Fake promotions Hyper consumism #3 Targeted attacks Spear phishing Remote access (RDP, VPN) Data leak from home devices Home Office GREATEST THREATS Over the Next 2 Years
  • 4. 06.08.21 References The Economist: “What history tells you about post- pandemic booms” https://www.economist.com/finance-and-economics/2021/04/29/what-history- tells-you-about-post-pandemic-booms The Economist: “The World In 2021” https://www.economist.com/the-world-in-2021 TED: “Lessons from the 1918 flu”, Laurie Garrett (2007) https://www.ted.com/talks/laurie_garrett_lessons_from_the_1918_flu “The Next Big Divide in Finance Takes Shape in Your Office” https://www.bloomberg.com/news/articles/2021-07-06/the-next-big-divide-in- finance-is-taking-shape-in-your-office