+ All Categories
Home > Technology > Cyber attacks and IT security management in 2025

Cyber attacks and IT security management in 2025

Date post: 20-Mar-2017
Category:
Upload: radarservices
View: 75 times
Download: 1 times
Share this document with a friend
20
CYBER ATTACKS & IT SECURITY IN 2025
Transcript

PowerPoint-Prsentation

CYBER ATTACKS & IT SECURITY IN 2025

The expert survey concerning future trends and challenges in IT security

IN 2025

& IT SECURITYCYBER ATTACKS

With which type of cyber attacks will we be confronted with in 2025?Which functionalities are IT security technologies currently lacking and what do they need to offer in 2025?Which are the biggest challenges for IT security today and which will there be in 2025?In which areas of IT security do companies need to invest in order to be viable in 2025?HOW SECURE ISTOMORROWS IT?

Qualitative study / Questionnaire, typological analysisExpert answers given byIT security officers of medium-sized and large enterprisesHighly specialized analysts that monitor IT security of large corporations Researchers that deal with IT security research for more than 5 yearsProgramming experts with specialization on IT risk analyses softwareABOUT THE EXPERTSAND THE METHOD

4

EXPERTS ABOUT CYBER ATTACKS IN 2025

DANGER NO. 1

The future starts now:

The number of attacks with regards to the Internet of Things will explode

DANGER NO. 1

DANGER NO. 2

DANGER NO. 2Malware of the next generation will be even more dangerous(Original quotes)Integrated backdoorsAttacks with undreamed precision, range and speed

DANGER NO. 3

DANGER NO. 3The user as starting point for attacks, especially for social engineering attacksUsers are the weakest linkPersonal data is stolenSocial engineering is growing

WHAT IT SECURITY TECHNOLOGY NEEDS TO OFFERIN 2025

WHAT IT SECURITY TECHNOLOGYNEEDS TO OFFER IN 2025

Most important ability: artificial intelligence for prompt reactions to attacks

Major advances in automated attack detection and reaction

Urgently needed new authentication methods

Self defense of systemsIntelligently automated detection of targeted attacks The end of the password generation

EXPERTS ABOUT CHALLENGESFOR IT SECURITY

Users, their security awareness and security knowhowTodays data mass and the future data explosionTODAYTOMORROWThe lack of IT standards and coordination between actors that fight against cyber criminalityThe fast technological progress, above all the IoTTOMORROWTODAYTODAYANDTOMORROW

THE RIGHT RESOURCE ALLOCATIONFOR A SECURECORPORATE IT IN 2025RESOURCE ALLOCATIONTHE RIGHTFOR A SECURECORPORATE IT IN 2025

THE RIGHT RESOURCE ALLOCATIONFOR A SECURECORPORATE IT IN 2025

Increase awareness on all hierarchy levels and train security professionals continuously

Ignorance on CxO level Staff in the security stone age2025 possibly security middle ages reached

More attention to automatized analyses of security relevant data in real time

The rIghtRESOURCE ALLOcATIONfor a securecorporate it IN 2025Predict attacksAnalyses in real time(Really) secure cloud solutions

CONCLUSION The framework factors that define the future of IT security:

CONCLUSION The framework factors that define the future of IT security:The user behaviorThe advance of IT security at similar pace as the technological progressThe development of cyber attacks in comparison with the further development of IT security technologies123

IT IS ALL ABOUT YOUR IT SECURITY.T.: +43 (1) 929 12 71-0 [email protected] www.radarservices.com 2016 RadarServices Smart IT-Security GmbHCONTACT US:


Recommended