SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Top 8
Cybersecurity
Trends 2020
Shawn Nutley
Introduction
2020 will deliver big changes to current technology. While the
world of tech always has big surprises and creates major change
seemingly overnight, many of these changes have been on the
horizon for quite some time. 
Security and automation are at the core of future changes. Here
are eight trends coming through in 2020 that will challenge
security, automation, cloud computing, and core tech
competency.
Managed Service Providers
Under Attack
Managed service providers (MSPs) deliver easier
ways to handle IT, human resources, business
administration, and many other parts of business
that can be handled by remote workers. Many
businesses purchase MSP agreements the same way
they’d purchase a software–like a box on a store
shelf. For tech businesses, the platforms used to
provide support are also bought like boxes on a
shelf.
Unfortunately, many of these products can be
exploited–not just because they’re new and
experimental, but because any startup can copy and
edit code for their own MSP platform. Hacking MSPs
to hack bigger batches of businesses rather than
targeting specific businesses is how cyber criminals
will make their attacks more efficient.
Endpoint Security
Buyouts & Buy-Ins
Coincidentally, many security services exist as boxes
on the shelf as well. Some startups and niche security
companies are being bought by larger companies. 
With Blackberry acquiring Cylance and VMWare
acquiring Carbon Black, many existing tech services
and hardware companies are entering the security
space by bringing the security that their clients need
under the same roof as their tools and techniques.
5G Opportunities and
Risks. Mostly Risks
5G brings at the very least a massive boost in bandwidth,
allowing more information to flow faster and with better
consistency. 
While many services can become more powerful and
bigger platforms can operate entirely in cloud services,
security risks are broadened as well. Already vulnerable
wireless technology will be even more vulnerable in the
future without active security changes.
IoT Continues Despite
Growing Pains
IoT continues the story of new opportunities with old
risks. While IoT breaches continue to happen, the world
of logistics and service delivery has to move forward. 
With more advanced network-connected devices that
give more information through meters and sensors, tech
companies need to wrestle with future IoT dependency
and the high risks associated with breaches.
Cloud Security
Problems and
Subject Matter
Experts
In spring 2019, Capital One was breached
by former Amazon Web Services (AWS)
employee Paige A. Thompson. Due to
firewall misconfiguration, Thompson was
able to access and compromise over 106
million customers and applicants in the
US and Canada.
The breach highlights multiple issues, ranging from the
complexity of cloud computing to the newness of cloud
computing as it goes through countless changes.
Although Capital One’s security team was praised by
Amazon ahead of a Senate push for an FTC probe. 
While early configuration details are murky–as it was
unclear how complex or simple the mistakes were–it
highlights the abuse of insider knowledge from a
former employee.
It was an abuse of a system that has less than a decade
of certification experience. The official certification
platform began in 2013, and in a rapid era of digital
technology change, hiring professionals could make
huge mistakes while vetting potential hires in 2020.
Digital World Regulations
Create New Opportunities
Whether it’s the IAVA compliance of old or GDPR, many
companies scramble to become compliant. Multiple countries
and regions have different approaching compliance, and some
businesses fall under multiple compliance demands. GDPR
remains the major global leader of compliance due to its
European Union-wide responsibilities.
No matter how smart your tech team seems, it’s
best to at least bring in a few mock inspections to
ensure compliance. More companies are emerging
to deliver compliance as a service and
testing/inspection. With these companies comes
promises of actual compliance, and just as business
leaders need to be careful about competent
security, fake compliance is a risk.
Some Tech Opportunities
Include Talent Shortages
.
Cybersecurity is the theme of many of these
changes, and even though recent events have
highlighted a need for more security, it’s not a
new demand. Many parts of the tech world
experience talent shortages, despite an
educational push towards tech interests in
general.
While there are many general programmers,
technicians, engineers and analysts, they aren’t
always specific to a need. While cybersecurity
started as a networking focus with a bit of
coding experience, it is very much an
independent study that needs specialists for
the time being–and there aren’t enough of
them quite yet.
Bigger Cybersecurity
Spending
More security risks means more spending on
security. Whether due to compliance
requirements or simply not wanting millions
of dollars in digital and productivity damage,
companies have increased security-specific
spending.
Hiring security talent, buying security services, and
upgrading hardware are the more popular spending
areas. Companies also need to plan for if–not when–a
breach happens by purchasing cyber incident insurance. 
This form of business insurance provides coverage in the
event of cyber theft, data breaches, or other cyber events.
Paying out settlements, buying credit monitoring for
exposed victims, and litigation costs are often main
coverage points.
While security is at the forefront of 2020,
there are many technological
advancements and scientific endeavors to
keep in mind. Contact a cybersecurity
expert to discuss other tech points, or to
secure your tech assets.
THANK YOU FOR
YOUR TIME
Please visit shawnnutley.net.

Contenu connexe

Tendances

CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and DocumentsNuance Communications
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 

Tendances (20)

Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 

Similaire à Top 8 Cybersecurity Trends 2020

Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 

Similaire à Top 8 Cybersecurity Trends 2020 (20)

Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Vps server 3
Vps server 3Vps server 3
Vps server 3
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 

Plus de Shawn Nutley

Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Shawn Nutley
 
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Shawn Nutley
 
Why Motivation Matters for Success
Why Motivation Matters for SuccessWhy Motivation Matters for Success
Why Motivation Matters for SuccessShawn Nutley
 
5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great LeadersShawn Nutley
 
Great TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersGreat TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersShawn Nutley
 
Productivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursProductivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursShawn Nutley
 
Achieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceAchieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceShawn Nutley
 
How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2Shawn Nutley
 
How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1Shawn Nutley
 
Tips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyTips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyShawn Nutley
 
How Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpHow Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpShawn Nutley
 
How To Become A More Innovative Leader
How To Become A More Innovative LeaderHow To Become A More Innovative Leader
How To Become A More Innovative LeaderShawn Nutley
 
Why Leaders Need To Take Advantage of Mondays
Why Leaders Need To Take Advantage of MondaysWhy Leaders Need To Take Advantage of Mondays
Why Leaders Need To Take Advantage of MondaysShawn Nutley
 
How To Create Company Champions In Your Organization
How To Create Company Champions In Your OrganizationHow To Create Company Champions In Your Organization
How To Create Company Champions In Your OrganizationShawn Nutley
 
How To Manage Lazy Employees
How To Manage Lazy EmployeesHow To Manage Lazy Employees
How To Manage Lazy EmployeesShawn Nutley
 
Notable International Fintech Trends For 2021
Notable International Fintech Trends For 2021Notable International Fintech Trends For 2021
Notable International Fintech Trends For 2021Shawn Nutley
 
Leadership Communication Trends in 2021
Leadership Communication Trends in 2021Leadership Communication Trends in 2021
Leadership Communication Trends in 2021Shawn Nutley
 
How To Create A Bulletproof Patent
How To Create A Bulletproof PatentHow To Create A Bulletproof Patent
How To Create A Bulletproof PatentShawn Nutley
 
What Is Civic Tech?
What Is Civic Tech?What Is Civic Tech?
What Is Civic Tech?Shawn Nutley
 
How To Balance Profit and Purpose In Your Business
How To Balance Profit and Purpose In Your BusinessHow To Balance Profit and Purpose In Your Business
How To Balance Profit and Purpose In Your BusinessShawn Nutley
 

Plus de Shawn Nutley (20)

Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
 
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
 
Why Motivation Matters for Success
Why Motivation Matters for SuccessWhy Motivation Matters for Success
Why Motivation Matters for Success
 
5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders
 
Great TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersGreat TED Talks For Today’s Leaders
Great TED Talks For Today’s Leaders
 
Productivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursProductivity Tips For Entrepreneurs
Productivity Tips For Entrepreneurs
 
Achieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceAchieving A Great Work-Life Balance
Achieving A Great Work-Life Balance
 
How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2
 
How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1
 
Tips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyTips To Encourage Teamwork Remotely
Tips To Encourage Teamwork Remotely
 
How Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpHow Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming Up
 
How To Become A More Innovative Leader
How To Become A More Innovative LeaderHow To Become A More Innovative Leader
How To Become A More Innovative Leader
 
Why Leaders Need To Take Advantage of Mondays
Why Leaders Need To Take Advantage of MondaysWhy Leaders Need To Take Advantage of Mondays
Why Leaders Need To Take Advantage of Mondays
 
How To Create Company Champions In Your Organization
How To Create Company Champions In Your OrganizationHow To Create Company Champions In Your Organization
How To Create Company Champions In Your Organization
 
How To Manage Lazy Employees
How To Manage Lazy EmployeesHow To Manage Lazy Employees
How To Manage Lazy Employees
 
Notable International Fintech Trends For 2021
Notable International Fintech Trends For 2021Notable International Fintech Trends For 2021
Notable International Fintech Trends For 2021
 
Leadership Communication Trends in 2021
Leadership Communication Trends in 2021Leadership Communication Trends in 2021
Leadership Communication Trends in 2021
 
How To Create A Bulletproof Patent
How To Create A Bulletproof PatentHow To Create A Bulletproof Patent
How To Create A Bulletproof Patent
 
What Is Civic Tech?
What Is Civic Tech?What Is Civic Tech?
What Is Civic Tech?
 
How To Balance Profit and Purpose In Your Business
How To Balance Profit and Purpose In Your BusinessHow To Balance Profit and Purpose In Your Business
How To Balance Profit and Purpose In Your Business
 

Dernier

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 

Dernier (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 

Top 8 Cybersecurity Trends 2020

  • 2. Introduction 2020 will deliver big changes to current technology. While the world of tech always has big surprises and creates major change seemingly overnight, many of these changes have been on the horizon for quite some time.  Security and automation are at the core of future changes. Here are eight trends coming through in 2020 that will challenge security, automation, cloud computing, and core tech competency.
  • 3. Managed Service Providers Under Attack Managed service providers (MSPs) deliver easier ways to handle IT, human resources, business administration, and many other parts of business that can be handled by remote workers. Many businesses purchase MSP agreements the same way they’d purchase a software–like a box on a store shelf. For tech businesses, the platforms used to provide support are also bought like boxes on a shelf.
  • 4. Unfortunately, many of these products can be exploited–not just because they’re new and experimental, but because any startup can copy and edit code for their own MSP platform. Hacking MSPs to hack bigger batches of businesses rather than targeting specific businesses is how cyber criminals will make their attacks more efficient.
  • 5. Endpoint Security Buyouts & Buy-Ins Coincidentally, many security services exist as boxes on the shelf as well. Some startups and niche security companies are being bought by larger companies.  With Blackberry acquiring Cylance and VMWare acquiring Carbon Black, many existing tech services and hardware companies are entering the security space by bringing the security that their clients need under the same roof as their tools and techniques.
  • 6. 5G Opportunities and Risks. Mostly Risks 5G brings at the very least a massive boost in bandwidth, allowing more information to flow faster and with better consistency.  While many services can become more powerful and bigger platforms can operate entirely in cloud services, security risks are broadened as well. Already vulnerable wireless technology will be even more vulnerable in the future without active security changes.
  • 7. IoT Continues Despite Growing Pains IoT continues the story of new opportunities with old risks. While IoT breaches continue to happen, the world of logistics and service delivery has to move forward.  With more advanced network-connected devices that give more information through meters and sensors, tech companies need to wrestle with future IoT dependency and the high risks associated with breaches.
  • 8. Cloud Security Problems and Subject Matter Experts In spring 2019, Capital One was breached by former Amazon Web Services (AWS) employee Paige A. Thompson. Due to firewall misconfiguration, Thompson was able to access and compromise over 106 million customers and applicants in the US and Canada.
  • 9. The breach highlights multiple issues, ranging from the complexity of cloud computing to the newness of cloud computing as it goes through countless changes. Although Capital One’s security team was praised by Amazon ahead of a Senate push for an FTC probe.  While early configuration details are murky–as it was unclear how complex or simple the mistakes were–it highlights the abuse of insider knowledge from a former employee. It was an abuse of a system that has less than a decade of certification experience. The official certification platform began in 2013, and in a rapid era of digital technology change, hiring professionals could make huge mistakes while vetting potential hires in 2020.
  • 10. Digital World Regulations Create New Opportunities Whether it’s the IAVA compliance of old or GDPR, many companies scramble to become compliant. Multiple countries and regions have different approaching compliance, and some businesses fall under multiple compliance demands. GDPR remains the major global leader of compliance due to its European Union-wide responsibilities.
  • 11. No matter how smart your tech team seems, it’s best to at least bring in a few mock inspections to ensure compliance. More companies are emerging to deliver compliance as a service and testing/inspection. With these companies comes promises of actual compliance, and just as business leaders need to be careful about competent security, fake compliance is a risk.
  • 12. Some Tech Opportunities Include Talent Shortages . Cybersecurity is the theme of many of these changes, and even though recent events have highlighted a need for more security, it’s not a new demand. Many parts of the tech world experience talent shortages, despite an educational push towards tech interests in general.
  • 13. While there are many general programmers, technicians, engineers and analysts, they aren’t always specific to a need. While cybersecurity started as a networking focus with a bit of coding experience, it is very much an independent study that needs specialists for the time being–and there aren’t enough of them quite yet.
  • 14. Bigger Cybersecurity Spending More security risks means more spending on security. Whether due to compliance requirements or simply not wanting millions of dollars in digital and productivity damage, companies have increased security-specific spending.
  • 15. Hiring security talent, buying security services, and upgrading hardware are the more popular spending areas. Companies also need to plan for if–not when–a breach happens by purchasing cyber incident insurance.  This form of business insurance provides coverage in the event of cyber theft, data breaches, or other cyber events. Paying out settlements, buying credit monitoring for exposed victims, and litigation costs are often main coverage points.
  • 16. While security is at the forefront of 2020, there are many technological advancements and scientific endeavors to keep in mind. Contact a cybersecurity expert to discuss other tech points, or to secure your tech assets.
  • 17. THANK YOU FOR YOUR TIME Please visit shawnnutley.net.