SlideShare a Scribd company logo
Top 12 Predictions from Leading
Cybersecurity Experts
ibm.biz/TourCyberThreatAnalysis
What’s in store for cybersecurity in 2017?
With the increasing magnitude and frequency
of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
ibm.biz/TourCyberThreatAnalysis
“2017 will be the year of ‘hunt’
analysis, where organizations will
proactively search through their
network for threats versus having
an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
The year of hunt analysis
ibm.biz/TourCyberThreatAnalysis
“We will see the proliferation of the
Internet of Things as a tool to cause
disruptions and attacks on critical
infrastructure. More cyber attacks
will become crimes that result in
physical harm.”
Michael Goedeker, CEO and Founder
HAKDEFNET and Security Researcher
IoT causes disruptions
ibm.biz/TourCyberThreatAnalysis
“Social media providers will
continue to seek the right balance
of cooperating with government and
protecting their business reputation.”
Todd M. Rosenblum, Senior Executive
for i2 Safer Planet
Cybersecurity and social media
ibm.biz/TourCyberThreatAnalysis
“Private sector companies will
increasingly participate in military style
‘wargames’ to test the readiness of
their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
Cybersecurity wargames
ibm.biz/TourCyberThreatAnalysis
“Rise of machines—more AI and cognitive
technology will be implemented to make up
for the shortfall in trained and experienced
cybersecurity professionals.”
Morgan Wright, Cyber Terrorism
and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities
will help reduce elevated privilege abuse and
insider threat.”
Shahid Shah, CEO at Netspective Communications,
Cybersecurity and Risk Consultant
ibm.biz/TourCyberThreatAnalysis
“Zero-day exploit value on the dark
web will far exceed the amount that
companies are willing to pay for ‘bug
bounties’ due to the overall value of
data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc.
and Author Hacked Again
Zero-day exploit
ibm.biz/TourCyberThreatAnalysis
“The security versus convenience
debate will enter the public eye as
high-profile companies suffer incidents
that could have been prevented with
two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
ibm.biz/TourCyberThreatAnalysis
“Huge DDoS attacks coinciding with fake news
tweets about a major data breach and unreliable,
but viral, social media posts and sloppy tech
reporting by a few bloggers and media sites
will cause a significant, but temporary, drop in
select stocks. The hidden goal of the hackers:
manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and
Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
ibm.biz/TourCyberThreatAnalysis
“Trust in systems will be broken as
bad guys move from just exfiltrating
data to changing it.”
Caleb Barlow, Vice President of IBM security
Trust will be broken
ibm.biz/TourCyberThreatAnalysis
“Companies will seek to quantify the
costs and benefits of new technologies
versus cost and likelihood of a breach,
as information security becomes
less an IT problem and more a risk
management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
ibm.biz/TourCyberThreatAnalysis
“Many custom services in healthcare, retail
and financial depend on knowing customers
and anticipating their future needs. But
personalization data can lead to loss of privacy
and increased security risks. The pressure to
balance these three sometimes conflicting
requirements will increase significantly in 2017.”
Diana Kelley, Global Executive
Security Advisor, IBM
Pressure to balance privacy,
personalization and security
ibm.biz/TourCyberThreatAnalysis
“Industries such as energy and
utilities, manufacturing and supply
chains have remained relatively
isolated from major cyber attacks.
This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
Be acutely aware of the threatscape
and equip yourself to predict, mitigate
and counter cyber attacks:
ibm.biz/TourCyberThreatAnalysis

More Related Content

More from IBM Analytics

Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
IBM Analytics
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to
IBM Analytics
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
IBM Analytics
 
Cognitive banking with expert insights
Cognitive banking with expert insightsCognitive banking with expert insights
Cognitive banking with expert insights
IBM Analytics
 
Sales performance management and C-level goals
Sales performance management and C-level goalsSales performance management and C-level goals
Sales performance management and C-level goals
IBM Analytics
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagement
IBM Analytics
 
Expert opinion on managing data breaches
Expert opinion on managing data breachesExpert opinion on managing data breaches
Expert opinion on managing data breaches
IBM Analytics
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analytics
IBM Analytics
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
IBM Analytics
 
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive eraIBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM Analytics
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation management
IBM Analytics
 
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attendIBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Analytics
 
Data science tips for data engineers
Data science tips for data engineersData science tips for data engineers
Data science tips for data engineers
IBM Analytics
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats?
IBM Analytics
 
10 benefits to thinking inside Box
10 benefits to thinking inside Box10 benefits to thinking inside Box
10 benefits to thinking inside Box
IBM Analytics
 
The digital transformation of the French Open
The digital transformation of the French OpenThe digital transformation of the French Open
The digital transformation of the French Open
IBM Analytics
 
Bridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architectureBridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architecture
IBM Analytics
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?
IBM Analytics
 
What CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on itWhat CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on it
IBM Analytics
 
Banking in the age of the empowered consumer
Banking in the age of the empowered consumerBanking in the age of the empowered consumer
Banking in the age of the empowered consumer
IBM Analytics
 

More from IBM Analytics (20)

Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Cognitive banking with expert insights
Cognitive banking with expert insightsCognitive banking with expert insights
Cognitive banking with expert insights
 
Sales performance management and C-level goals
Sales performance management and C-level goalsSales performance management and C-level goals
Sales performance management and C-level goals
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagement
 
Expert opinion on managing data breaches
Expert opinion on managing data breachesExpert opinion on managing data breaches
Expert opinion on managing data breaches
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analytics
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
 
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive eraIBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation management
 
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attendIBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
 
Data science tips for data engineers
Data science tips for data engineersData science tips for data engineers
Data science tips for data engineers
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats?
 
10 benefits to thinking inside Box
10 benefits to thinking inside Box10 benefits to thinking inside Box
10 benefits to thinking inside Box
 
The digital transformation of the French Open
The digital transformation of the French OpenThe digital transformation of the French Open
The digital transformation of the French Open
 
Bridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architectureBridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architecture
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?
 
What CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on itWhat CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on it
 
Banking in the age of the empowered consumer
Banking in the age of the empowered consumerBanking in the age of the empowered consumer
Banking in the age of the empowered consumer
 

Recently uploaded

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Top 12 cyber security predictions for 2017

  • 1. Top 12 Predictions from Leading Cybersecurity Experts
  • 2. ibm.biz/TourCyberThreatAnalysis What’s in store for cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of possible threats to counter and mitigate?
  • 3. ibm.biz/TourCyberThreatAnalysis “2017 will be the year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis The year of hunt analysis
  • 4. ibm.biz/TourCyberThreatAnalysis “We will see the proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.” Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher IoT causes disruptions
  • 5. ibm.biz/TourCyberThreatAnalysis “Social media providers will continue to seek the right balance of cooperating with government and protecting their business reputation.” Todd M. Rosenblum, Senior Executive for i2 Safer Planet Cybersecurity and social media
  • 6. ibm.biz/TourCyberThreatAnalysis “Private sector companies will increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis Cybersecurity wargames
  • 7. ibm.biz/TourCyberThreatAnalysis “Rise of machines—more AI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.” Morgan Wright, Cyber Terrorism and Cyber Crime Analyst Rise of cognitive in cybersecurity “New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.” Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant
  • 8. ibm.biz/TourCyberThreatAnalysis “Zero-day exploit value on the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.” Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again Zero-day exploit
  • 9. ibm.biz/TourCyberThreatAnalysis “The security versus convenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.” Tyler Carbone, COO at Terbium Labs Security vs. convenience debate
  • 10. ibm.biz/TourCyberThreatAnalysis “Huge DDoS attacks coinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.” Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc. Hackers use fake news
  • 11. ibm.biz/TourCyberThreatAnalysis “Trust in systems will be broken as bad guys move from just exfiltrating data to changing it.” Caleb Barlow, Vice President of IBM security Trust will be broken
  • 12. ibm.biz/TourCyberThreatAnalysis “Companies will seek to quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.” Tyler Carbone, COO at Terbium Labs Rise of cyber risk management
  • 13. ibm.biz/TourCyberThreatAnalysis “Many custom services in healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.” Diana Kelley, Global Executive Security Advisor, IBM Pressure to balance privacy, personalization and security
  • 14. ibm.biz/TourCyberThreatAnalysis “Industries such as energy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.” Michael Kehoe, WW Program Director, IBM Cyber attacks spread
  • 15. Be acutely aware of the threatscape and equip yourself to predict, mitigate and counter cyber attacks: ibm.biz/TourCyberThreatAnalysis