SlideShare a Scribd company logo
1
Strategies to Combat New,
Innovative Cyber Threats in 2019
www.paladion.net
2
Enterprise Security for 2019
Key Cyber Strategies
to Deploy in 2019
AI-Driven Managed Detection
& Response
AI_Driven Vulnerability
Management & Response
Red Teaming
Cloud Security
Key Cyber Attacks to Defend Against in 2019
More sophisticated attacks on
individuals
Politically—motived attacks
and increased regulation
Increased attacks against small
& Medium organizations
Attacks driven by and
targeting AI systems
Explosion in size and
porousness of attack surface
3
New, Innovative Threats to Watch out for
Biometric AttacksBlockchain AttacksCryptojacking Drive-by-DownloadsShadow IT Attacks
Biometric technology
can be stolen,
replicated, and altered.
Blockchain based
technologies needs to
secured like you would
other platforms.
Cybercriminals are now
forcing their victims to
mine cryptocurrency
for them.
As users get cautious,
attackers will use
exploits that require no
action from the user
Applications are being
installed without
central oversite
4
Key Threats 2019
5
Increased Attacks Against Small & Medium Orgs
2019 Prediction
More SMBs work with external security vendors, and market their new
robust security as a primary selling point.
Cyber criminals are targeting small &
Medium organizations for a few reasons:
▪ More data usage make small orgs more
valuable targets.
▪ They have weaker supply chains
▪ The cost of sophisticated attacks has
decreased.
▪ Small orgs are the weak links in enterprise
supply chain
▪ Small orgs are easier to breach than
enterprises.
58%
of malware victims
are small biz
$2.2m
= av. cost of an
attack on a small biz
6
Political Attacks and Increased Regulation
2019 Prediction
Governments play a great role in cybercrime and cybersecurity- internally
and externally.
Governments will increase their cyber
involvement in a few key ways:
▪ Subtle cyberwarfare between governments
▪ More cybercrime terrorist attacks
▪ Direct attacks against infrastructure,
companies, and populations $1.63
billion = maximum fine
Facebook could face
from GDPR alone
Governments will impose greater
cyber regulation:
▪ GDPR is only the beginning
▪ More governments will regulate cybersecurity
▪ Multi-billion $ fines become the norm
7
More Sophisticated Attacks on Individuals
2019 Prediction Monitoring of User Behavior data becomes mandatory.
Individual users reman the main cause
of breaches:
▪ Emerging tech makes it easier to trick
individuals.
▪ All user credentials are now high-value
▪ More insider threats from current & past
employees
▪ Majority of breaches = targeted employees
or negligence
▪ Targeted attacks increase in sophistication
▪ Targeted attacks focus on snr. execs and
their support staff
84%
of reported cyber
attacks caused by
individual errors /
insider threats.
8
Explosion in Attack Surface
2019 Prediction
Orgs become larger, more interconnected, and more fragile to even small
attacks— especially ransomware.
Every org is increasing their attack surface
through many areas:
▪ Cloud adoption
▪ IoT proliferation
▪ More external partnerships
IoT will create the most new vulnerabilities:
▪ IoT devices can be hacked and deactivated
▪ IoT devices give access to central networks
▪ Industries with the most mission-critical IoT
devices suffer most
34%
of executives plan to
assess the business risk
of their upcoming IoT
adoption.
Only
9
AI-Driven and Targeted Attacks
2019 Prediction We see the first large-scale, sophisticated, AI-driven attacks.
AI systems become targets:
▪ AI programs are data-rich
▪ AI programs are automated, unsupervised,
and corruptible
91%
of cybersecurity
experts concerned
about criminals using
AI in their attacks
Criminals use AI to supercharge their attacks:
▪ Increased speed, scale, sophistication
▪ Capable of exploiting larger org. perimeters
▪ Increased asymmetry between attackers /
organizations
10
Key Strategies 2019
11
Strategy 1:
AI-Driven Managed
Detection & Response
(MDR)
The average organization requires over 100 days to find
and remediate a threat that has already breached their
systems.
MDR offers a comprehensive solution to combat current
threats before it can cause catastrophic damages.
2019 will see MDR become a standard element of every
effective cyber defense plan.
AI and ML will be increasingly integrated into MDR
programs.
MDR services are filling the need of organizations of all sizes
that lack internal security resources and expertise…”
- Gartner
MDR Services Market Guide, June 2018
12
Strategy 2:
AI-Driven Vulnerability
Management &
Response
AI-Driven Vulnerability Management and Response (VMR)
goes beyond traditional VM programs to offer advanced
triaging and swift remediation.
AI-Driven VMR fills a crucial gap in current VM programs
by focusing on auto remediation of vulnerabilities and
exploits seen in the wild.
In 2019, organizations will utilize Artificial Intelligence
driven VM programs that also provide remediation
With AI-Driven VMR, organizations will fortify IT systems
and be much more resilient to cyber attacks
According to CVE, there were 15,571 vulnerabilities reported in 2018.
Since 1999 there have been a total of 109615 reported vulnerabilities.
Many of them still relevant today.
13
Strategy 3:
Red Teaming
Red Teaming shows you how your internal security
performs during a real-world attack.
Red Teaming uncovers the exact security holes that
attackers will use to penetrate your systems.
In 2019, more organizations will utilize Red Teaming
exercises to give their internal security teams “hands on”
experience fighting an attack.
By repeating Red Teaming, organizations will continuously
evolve their defenses, and stay one step ahead of their
attackers.
Red team exercises generally provide the most insight into
your blue-team’s readiness to face an attack.”
- CSO Online
14
Strategy 4:
Cloud Security
Organizations need to adopt powerful, cost-effective Cloud
services to remain competitive.
Cloud providers often provide far less protection than their
users assume.
After a high-profile breach of a major Cloud provider, most
organizations will begin to work with Cloud Security
providers.
Cloud Security services will extend beyond popular
platforms—such as Azure and O365.
of organizations believe that traditional
approaches to security don’t work for Cloud
infrastructures.84%
15
Let’s discuss how we can
combat tomorrow’s
sophisticated cyber threats
Visit www.paladion.net
Email sales@paladion.net
16
Thank You

More Related Content

What's hot

Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
Supply Chain Coalition
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
Bill Chamberlin
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
Ulf Mattsson
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
Datsun Arnold
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Knowledge Group
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
Olivier Busolini
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
PECB
 

What's hot (20)

Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 

Similar to Strategies to combat new, innovative cyber threats in 2019

Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
Yamuna5
 
Emerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdfEmerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdf
Ciente
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
MobibizIndia1
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
K7 Computing Pvt Ltd
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
K7 Computing Pvt Ltd
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now
Paul Wood
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
MobibizIndia1
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
IBM Events
 

Similar to Strategies to combat new, innovative cyber threats in 2019 (20)

Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Emerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdfEmerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdf
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Strategies to combat new, innovative cyber threats in 2019

  • 1. 1 Strategies to Combat New, Innovative Cyber Threats in 2019 www.paladion.net
  • 2. 2 Enterprise Security for 2019 Key Cyber Strategies to Deploy in 2019 AI-Driven Managed Detection & Response AI_Driven Vulnerability Management & Response Red Teaming Cloud Security Key Cyber Attacks to Defend Against in 2019 More sophisticated attacks on individuals Politically—motived attacks and increased regulation Increased attacks against small & Medium organizations Attacks driven by and targeting AI systems Explosion in size and porousness of attack surface
  • 3. 3 New, Innovative Threats to Watch out for Biometric AttacksBlockchain AttacksCryptojacking Drive-by-DownloadsShadow IT Attacks Biometric technology can be stolen, replicated, and altered. Blockchain based technologies needs to secured like you would other platforms. Cybercriminals are now forcing their victims to mine cryptocurrency for them. As users get cautious, attackers will use exploits that require no action from the user Applications are being installed without central oversite
  • 5. 5 Increased Attacks Against Small & Medium Orgs 2019 Prediction More SMBs work with external security vendors, and market their new robust security as a primary selling point. Cyber criminals are targeting small & Medium organizations for a few reasons: ▪ More data usage make small orgs more valuable targets. ▪ They have weaker supply chains ▪ The cost of sophisticated attacks has decreased. ▪ Small orgs are the weak links in enterprise supply chain ▪ Small orgs are easier to breach than enterprises. 58% of malware victims are small biz $2.2m = av. cost of an attack on a small biz
  • 6. 6 Political Attacks and Increased Regulation 2019 Prediction Governments play a great role in cybercrime and cybersecurity- internally and externally. Governments will increase their cyber involvement in a few key ways: ▪ Subtle cyberwarfare between governments ▪ More cybercrime terrorist attacks ▪ Direct attacks against infrastructure, companies, and populations $1.63 billion = maximum fine Facebook could face from GDPR alone Governments will impose greater cyber regulation: ▪ GDPR is only the beginning ▪ More governments will regulate cybersecurity ▪ Multi-billion $ fines become the norm
  • 7. 7 More Sophisticated Attacks on Individuals 2019 Prediction Monitoring of User Behavior data becomes mandatory. Individual users reman the main cause of breaches: ▪ Emerging tech makes it easier to trick individuals. ▪ All user credentials are now high-value ▪ More insider threats from current & past employees ▪ Majority of breaches = targeted employees or negligence ▪ Targeted attacks increase in sophistication ▪ Targeted attacks focus on snr. execs and their support staff 84% of reported cyber attacks caused by individual errors / insider threats.
  • 8. 8 Explosion in Attack Surface 2019 Prediction Orgs become larger, more interconnected, and more fragile to even small attacks— especially ransomware. Every org is increasing their attack surface through many areas: ▪ Cloud adoption ▪ IoT proliferation ▪ More external partnerships IoT will create the most new vulnerabilities: ▪ IoT devices can be hacked and deactivated ▪ IoT devices give access to central networks ▪ Industries with the most mission-critical IoT devices suffer most 34% of executives plan to assess the business risk of their upcoming IoT adoption. Only
  • 9. 9 AI-Driven and Targeted Attacks 2019 Prediction We see the first large-scale, sophisticated, AI-driven attacks. AI systems become targets: ▪ AI programs are data-rich ▪ AI programs are automated, unsupervised, and corruptible 91% of cybersecurity experts concerned about criminals using AI in their attacks Criminals use AI to supercharge their attacks: ▪ Increased speed, scale, sophistication ▪ Capable of exploiting larger org. perimeters ▪ Increased asymmetry between attackers / organizations
  • 11. 11 Strategy 1: AI-Driven Managed Detection & Response (MDR) The average organization requires over 100 days to find and remediate a threat that has already breached their systems. MDR offers a comprehensive solution to combat current threats before it can cause catastrophic damages. 2019 will see MDR become a standard element of every effective cyber defense plan. AI and ML will be increasingly integrated into MDR programs. MDR services are filling the need of organizations of all sizes that lack internal security resources and expertise…” - Gartner MDR Services Market Guide, June 2018
  • 12. 12 Strategy 2: AI-Driven Vulnerability Management & Response AI-Driven Vulnerability Management and Response (VMR) goes beyond traditional VM programs to offer advanced triaging and swift remediation. AI-Driven VMR fills a crucial gap in current VM programs by focusing on auto remediation of vulnerabilities and exploits seen in the wild. In 2019, organizations will utilize Artificial Intelligence driven VM programs that also provide remediation With AI-Driven VMR, organizations will fortify IT systems and be much more resilient to cyber attacks According to CVE, there were 15,571 vulnerabilities reported in 2018. Since 1999 there have been a total of 109615 reported vulnerabilities. Many of them still relevant today.
  • 13. 13 Strategy 3: Red Teaming Red Teaming shows you how your internal security performs during a real-world attack. Red Teaming uncovers the exact security holes that attackers will use to penetrate your systems. In 2019, more organizations will utilize Red Teaming exercises to give their internal security teams “hands on” experience fighting an attack. By repeating Red Teaming, organizations will continuously evolve their defenses, and stay one step ahead of their attackers. Red team exercises generally provide the most insight into your blue-team’s readiness to face an attack.” - CSO Online
  • 14. 14 Strategy 4: Cloud Security Organizations need to adopt powerful, cost-effective Cloud services to remain competitive. Cloud providers often provide far less protection than their users assume. After a high-profile breach of a major Cloud provider, most organizations will begin to work with Cloud Security providers. Cloud Security services will extend beyond popular platforms—such as Azure and O365. of organizations believe that traditional approaches to security don’t work for Cloud infrastructures.84%
  • 15. 15 Let’s discuss how we can combat tomorrow’s sophisticated cyber threats Visit www.paladion.net Email sales@paladion.net