Date post: | 20-Mar-2017 |
Category: |
Technology |
Upload: | radarservices |
View: | 75 times |
Download: | 1 times |
PowerPoint-Prsentation
CYBER ATTACKS & IT SECURITY IN 2025
The expert survey concerning future trends and challenges in IT security
IN 2025
& IT SECURITYCYBER ATTACKS
With which type of cyber attacks will we be confronted with in 2025?Which functionalities are IT security technologies currently lacking and what do they need to offer in 2025?Which are the biggest challenges for IT security today and which will there be in 2025?In which areas of IT security do companies need to invest in order to be viable in 2025?HOW SECURE ISTOMORROWS IT?
Qualitative study / Questionnaire, typological analysisExpert answers given byIT security officers of medium-sized and large enterprisesHighly specialized analysts that monitor IT security of large corporations Researchers that deal with IT security research for more than 5 yearsProgramming experts with specialization on IT risk analyses softwareABOUT THE EXPERTSAND THE METHOD
4
EXPERTS ABOUT CYBER ATTACKS IN 2025
DANGER NO. 1
The future starts now:
The number of attacks with regards to the Internet of Things will explode
DANGER NO. 1
DANGER NO. 2
DANGER NO. 2Malware of the next generation will be even more dangerous(Original quotes)Integrated backdoorsAttacks with undreamed precision, range and speed
DANGER NO. 3
DANGER NO. 3The user as starting point for attacks, especially for social engineering attacksUsers are the weakest linkPersonal data is stolenSocial engineering is growing
WHAT IT SECURITY TECHNOLOGY NEEDS TO OFFERIN 2025
WHAT IT SECURITY TECHNOLOGYNEEDS TO OFFER IN 2025
Most important ability: artificial intelligence for prompt reactions to attacks
Major advances in automated attack detection and reaction
Urgently needed new authentication methods
Self defense of systemsIntelligently automated detection of targeted attacks The end of the password generation
EXPERTS ABOUT CHALLENGESFOR IT SECURITY
Users, their security awareness and security knowhowTodays data mass and the future data explosionTODAYTOMORROWThe lack of IT standards and coordination between actors that fight against cyber criminalityThe fast technological progress, above all the IoTTOMORROWTODAYTODAYANDTOMORROW
THE RIGHT RESOURCE ALLOCATIONFOR A SECURECORPORATE IT IN 2025RESOURCE ALLOCATIONTHE RIGHTFOR A SECURECORPORATE IT IN 2025
THE RIGHT RESOURCE ALLOCATIONFOR A SECURECORPORATE IT IN 2025
Increase awareness on all hierarchy levels and train security professionals continuously
Ignorance on CxO level Staff in the security stone age2025 possibly security middle ages reached
More attention to automatized analyses of security relevant data in real time
The rIghtRESOURCE ALLOcATIONfor a securecorporate it IN 2025Predict attacksAnalyses in real time(Really) secure cloud solutions
CONCLUSION The framework factors that define the future of IT security:
CONCLUSION The framework factors that define the future of IT security:The user behaviorThe advance of IT security at similar pace as the technological progressThe development of cyber attacks in comparison with the further development of IT security technologies123
IT IS ALL ABOUT YOUR IT SECURITY.T.: +43 (1) 929 12 71-0 [email protected] www.radarservices.com 2016 RadarServices Smart IT-Security GmbHCONTACT US: