SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Top 8
Cybersecurity
Trends 2020
Shawn Nutley
Introduction
2020 will deliver big changes to current technology. While the
world of tech always has big surprises and creates major change
seemingly overnight, many of these changes have been on the
horizon for quite some time. 
Security and automation are at the core of future changes. Here
are eight trends coming through in 2020 that will challenge
security, automation, cloud computing, and core tech
competency.
Managed Service Providers
Under Attack
Managed service providers (MSPs) deliver easier
ways to handle IT, human resources, business
administration, and many other parts of business
that can be handled by remote workers. Many
businesses purchase MSP agreements the same way
they’d purchase a software–like a box on a store
shelf. For tech businesses, the platforms used to
provide support are also bought like boxes on a
shelf.
Unfortunately, many of these products can be
exploited–not just because they’re new and
experimental, but because any startup can copy and
edit code for their own MSP platform. Hacking MSPs
to hack bigger batches of businesses rather than
targeting specific businesses is how cyber criminals
will make their attacks more efficient.
Endpoint Security
Buyouts & Buy-Ins
Coincidentally, many security services exist as boxes
on the shelf as well. Some startups and niche security
companies are being bought by larger companies. 
With Blackberry acquiring Cylance and VMWare
acquiring Carbon Black, many existing tech services
and hardware companies are entering the security
space by bringing the security that their clients need
under the same roof as their tools and techniques.
5G Opportunities and
Risks. Mostly Risks
5G brings at the very least a massive boost in bandwidth,
allowing more information to flow faster and with better
consistency. 
While many services can become more powerful and
bigger platforms can operate entirely in cloud services,
security risks are broadened as well. Already vulnerable
wireless technology will be even more vulnerable in the
future without active security changes.
IoT Continues Despite
Growing Pains
IoT continues the story of new opportunities with old
risks. While IoT breaches continue to happen, the world
of logistics and service delivery has to move forward. 
With more advanced network-connected devices that
give more information through meters and sensors, tech
companies need to wrestle with future IoT dependency
and the high risks associated with breaches.
Cloud Security
Problems and
Subject Matter
Experts
In spring 2019, Capital One was breached
by former Amazon Web Services (AWS)
employee Paige A. Thompson. Due to
firewall misconfiguration, Thompson was
able to access and compromise over 106
million customers and applicants in the
US and Canada.
The breach highlights multiple issues, ranging from the
complexity of cloud computing to the newness of cloud
computing as it goes through countless changes.
Although Capital One’s security team was praised by
Amazon ahead of a Senate push for an FTC probe. 
While early configuration details are murky–as it was
unclear how complex or simple the mistakes were–it
highlights the abuse of insider knowledge from a
former employee.
It was an abuse of a system that has less than a decade
of certification experience. The official certification
platform began in 2013, and in a rapid era of digital
technology change, hiring professionals could make
huge mistakes while vetting potential hires in 2020.
Digital World Regulations
Create New Opportunities
Whether it’s the IAVA compliance of old or GDPR, many
companies scramble to become compliant. Multiple countries
and regions have different approaching compliance, and some
businesses fall under multiple compliance demands. GDPR
remains the major global leader of compliance due to its
European Union-wide responsibilities.
No matter how smart your tech team seems, it’s
best to at least bring in a few mock inspections to
ensure compliance. More companies are emerging
to deliver compliance as a service and
testing/inspection. With these companies comes
promises of actual compliance, and just as business
leaders need to be careful about competent
security, fake compliance is a risk.
Some Tech Opportunities
Include Talent Shortages
.
Cybersecurity is the theme of many of these
changes, and even though recent events have
highlighted a need for more security, it’s not a
new demand. Many parts of the tech world
experience talent shortages, despite an
educational push towards tech interests in
general.
While there are many general programmers,
technicians, engineers and analysts, they aren’t
always specific to a need. While cybersecurity
started as a networking focus with a bit of
coding experience, it is very much an
independent study that needs specialists for
the time being–and there aren’t enough of
them quite yet.
Bigger Cybersecurity
Spending
More security risks means more spending on
security. Whether due to compliance
requirements or simply not wanting millions
of dollars in digital and productivity damage,
companies have increased security-specific
spending.
Hiring security talent, buying security services, and
upgrading hardware are the more popular spending
areas. Companies also need to plan for if–not when–a
breach happens by purchasing cyber incident insurance. 
This form of business insurance provides coverage in the
event of cyber theft, data breaches, or other cyber events.
Paying out settlements, buying credit monitoring for
exposed victims, and litigation costs are often main
coverage points.
While security is at the forefront of 2020,
there are many technological
advancements and scientific endeavors to
keep in mind. Contact a cybersecurity
expert to discuss other tech points, or to
secure your tech assets.
THANK YOU FOR
YOUR TIME
Please visit shawnnutley.net.

Weitere ähnliche Inhalte

Was ist angesagt?

CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and DocumentsNuance Communications
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 

Was ist angesagt? (20)

Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 

Ähnlich wie Top 8 Cybersecurity Trends 2020

Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
What is Cloud Security And Why It is Important.pdf
What is Cloud Security And Why It is Important.pdfWhat is Cloud Security And Why It is Important.pdf
What is Cloud Security And Why It is Important.pdfPridesys IT Ltd.
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Group.11 Topic(Future It Infrastructure)ppt.pdf
Group.11 Topic(Future It Infrastructure)ppt.pdfGroup.11 Topic(Future It Infrastructure)ppt.pdf
Group.11 Topic(Future It Infrastructure)ppt.pdf23017156038
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 

Ähnlich wie Top 8 Cybersecurity Trends 2020 (20)

Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
What is Cloud Security And Why It is Important.pdf
What is Cloud Security And Why It is Important.pdfWhat is Cloud Security And Why It is Important.pdf
What is Cloud Security And Why It is Important.pdf
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Vps server 3
Vps server 3Vps server 3
Vps server 3
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Group.11 Topic(Future It Infrastructure)ppt.pdf
Group.11 Topic(Future It Infrastructure)ppt.pdfGroup.11 Topic(Future It Infrastructure)ppt.pdf
Group.11 Topic(Future It Infrastructure)ppt.pdf
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 

Mehr von Shawn Nutley

How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...
How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...
How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...Shawn Nutley
 
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...Shawn Nutley
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Shawn Nutley
 
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Shawn Nutley
 
Why Motivation Matters for Success
Why Motivation Matters for SuccessWhy Motivation Matters for Success
Why Motivation Matters for SuccessShawn Nutley
 
Toxic Workplace Habits to Ditch in the New Year
Toxic Workplace Habits to Ditch in the New YearToxic Workplace Habits to Ditch in the New Year
Toxic Workplace Habits to Ditch in the New YearShawn Nutley
 
5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great LeadersShawn Nutley
 
4 Ways Leaders Can Resolve Workplace Conflicts
4 Ways Leaders Can Resolve Workplace Conflicts4 Ways Leaders Can Resolve Workplace Conflicts
4 Ways Leaders Can Resolve Workplace ConflictsShawn Nutley
 
The Best TED Talks For Entrepreneurs To Check Out In 2022
The Best TED Talks For Entrepreneurs To Check Out In 2022The Best TED Talks For Entrepreneurs To Check Out In 2022
The Best TED Talks For Entrepreneurs To Check Out In 2022Shawn Nutley
 
Great TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersGreat TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersShawn Nutley
 
Great Podcasts For Leaders To Check Out In 2022
Great Podcasts For Leaders To Check Out In 2022Great Podcasts For Leaders To Check Out In 2022
Great Podcasts For Leaders To Check Out In 2022Shawn Nutley
 
Common Leadership Challenges
Common Leadership ChallengesCommon Leadership Challenges
Common Leadership ChallengesShawn Nutley
 
The Dangers of Fast Business Growth
The Dangers of Fast Business GrowthThe Dangers of Fast Business Growth
The Dangers of Fast Business GrowthShawn Nutley
 
Productivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursProductivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursShawn Nutley
 
Achieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceAchieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceShawn Nutley
 
How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2Shawn Nutley
 
How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1Shawn Nutley
 
The Benefits of Investing In Business Technology
The Benefits of Investing In Business TechnologyThe Benefits of Investing In Business Technology
The Benefits of Investing In Business TechnologyShawn Nutley
 
Tips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyTips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyShawn Nutley
 
How Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpHow Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpShawn Nutley
 

Mehr von Shawn Nutley (20)

How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...
How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...
How Healthy Competition in the Workplace Can Produce Sales Growth - Shawn Nut...
 
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...
Tips for Staying Energized at Work When You’re Running on Little Sleep - Shaw...
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
 
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
Lessons That Can Be Learned From The Office - Shawn Nutley _ Entrepreneurship...
 
Why Motivation Matters for Success
Why Motivation Matters for SuccessWhy Motivation Matters for Success
Why Motivation Matters for Success
 
Toxic Workplace Habits to Ditch in the New Year
Toxic Workplace Habits to Ditch in the New YearToxic Workplace Habits to Ditch in the New Year
Toxic Workplace Habits to Ditch in the New Year
 
5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders5 Traits Commonly Seen In Great Leaders
5 Traits Commonly Seen In Great Leaders
 
4 Ways Leaders Can Resolve Workplace Conflicts
4 Ways Leaders Can Resolve Workplace Conflicts4 Ways Leaders Can Resolve Workplace Conflicts
4 Ways Leaders Can Resolve Workplace Conflicts
 
The Best TED Talks For Entrepreneurs To Check Out In 2022
The Best TED Talks For Entrepreneurs To Check Out In 2022The Best TED Talks For Entrepreneurs To Check Out In 2022
The Best TED Talks For Entrepreneurs To Check Out In 2022
 
Great TED Talks For Today’s Leaders
Great TED Talks For Today’s LeadersGreat TED Talks For Today’s Leaders
Great TED Talks For Today’s Leaders
 
Great Podcasts For Leaders To Check Out In 2022
Great Podcasts For Leaders To Check Out In 2022Great Podcasts For Leaders To Check Out In 2022
Great Podcasts For Leaders To Check Out In 2022
 
Common Leadership Challenges
Common Leadership ChallengesCommon Leadership Challenges
Common Leadership Challenges
 
The Dangers of Fast Business Growth
The Dangers of Fast Business GrowthThe Dangers of Fast Business Growth
The Dangers of Fast Business Growth
 
Productivity Tips For Entrepreneurs
Productivity Tips For EntrepreneursProductivity Tips For Entrepreneurs
Productivity Tips For Entrepreneurs
 
Achieving A Great Work-Life Balance
Achieving A Great Work-Life BalanceAchieving A Great Work-Life Balance
Achieving A Great Work-Life Balance
 
How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2How To Look Out For Toxic Team Members Part 2
How To Look Out For Toxic Team Members Part 2
 
How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1How To Look Out For Toxic Team Members Part 1
How To Look Out For Toxic Team Members Part 1
 
The Benefits of Investing In Business Technology
The Benefits of Investing In Business TechnologyThe Benefits of Investing In Business Technology
The Benefits of Investing In Business Technology
 
Tips To Encourage Teamwork Remotely
Tips To Encourage Teamwork RemotelyTips To Encourage Teamwork Remotely
Tips To Encourage Teamwork Remotely
 
How Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming UpHow Tech and Energy Are Teaming Up
How Tech and Energy Are Teaming Up
 

Kürzlich hochgeladen

Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfCharles Cotter, PhD
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024Stephan Koning
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxWorkforce Group
 
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...Brian Solis
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examplesamberjiles31
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.mcshagufta46
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarNathanielSchmuck
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
 
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfAMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfJohnCarloValencia4
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Reportamberjiles31
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023Steve Rader
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfHajeJanKamps
 
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfGraham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfAnhNguyen97152
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Lviv Startup Club
 

Kürzlich hochgeladen (20)

Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
 
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...
The End of Business as Usual: Rewire the Way You Work to Succeed in the Consu...
 
WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examples
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry Webinar
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
 
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfAMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Report
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
 
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfGraham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)
 

Top 8 Cybersecurity Trends 2020

  • 2. Introduction 2020 will deliver big changes to current technology. While the world of tech always has big surprises and creates major change seemingly overnight, many of these changes have been on the horizon for quite some time.  Security and automation are at the core of future changes. Here are eight trends coming through in 2020 that will challenge security, automation, cloud computing, and core tech competency.
  • 3. Managed Service Providers Under Attack Managed service providers (MSPs) deliver easier ways to handle IT, human resources, business administration, and many other parts of business that can be handled by remote workers. Many businesses purchase MSP agreements the same way they’d purchase a software–like a box on a store shelf. For tech businesses, the platforms used to provide support are also bought like boxes on a shelf.
  • 4. Unfortunately, many of these products can be exploited–not just because they’re new and experimental, but because any startup can copy and edit code for their own MSP platform. Hacking MSPs to hack bigger batches of businesses rather than targeting specific businesses is how cyber criminals will make their attacks more efficient.
  • 5. Endpoint Security Buyouts & Buy-Ins Coincidentally, many security services exist as boxes on the shelf as well. Some startups and niche security companies are being bought by larger companies.  With Blackberry acquiring Cylance and VMWare acquiring Carbon Black, many existing tech services and hardware companies are entering the security space by bringing the security that their clients need under the same roof as their tools and techniques.
  • 6. 5G Opportunities and Risks. Mostly Risks 5G brings at the very least a massive boost in bandwidth, allowing more information to flow faster and with better consistency.  While many services can become more powerful and bigger platforms can operate entirely in cloud services, security risks are broadened as well. Already vulnerable wireless technology will be even more vulnerable in the future without active security changes.
  • 7. IoT Continues Despite Growing Pains IoT continues the story of new opportunities with old risks. While IoT breaches continue to happen, the world of logistics and service delivery has to move forward.  With more advanced network-connected devices that give more information through meters and sensors, tech companies need to wrestle with future IoT dependency and the high risks associated with breaches.
  • 8. Cloud Security Problems and Subject Matter Experts In spring 2019, Capital One was breached by former Amazon Web Services (AWS) employee Paige A. Thompson. Due to firewall misconfiguration, Thompson was able to access and compromise over 106 million customers and applicants in the US and Canada.
  • 9. The breach highlights multiple issues, ranging from the complexity of cloud computing to the newness of cloud computing as it goes through countless changes. Although Capital One’s security team was praised by Amazon ahead of a Senate push for an FTC probe.  While early configuration details are murky–as it was unclear how complex or simple the mistakes were–it highlights the abuse of insider knowledge from a former employee. It was an abuse of a system that has less than a decade of certification experience. The official certification platform began in 2013, and in a rapid era of digital technology change, hiring professionals could make huge mistakes while vetting potential hires in 2020.
  • 10. Digital World Regulations Create New Opportunities Whether it’s the IAVA compliance of old or GDPR, many companies scramble to become compliant. Multiple countries and regions have different approaching compliance, and some businesses fall under multiple compliance demands. GDPR remains the major global leader of compliance due to its European Union-wide responsibilities.
  • 11. No matter how smart your tech team seems, it’s best to at least bring in a few mock inspections to ensure compliance. More companies are emerging to deliver compliance as a service and testing/inspection. With these companies comes promises of actual compliance, and just as business leaders need to be careful about competent security, fake compliance is a risk.
  • 12. Some Tech Opportunities Include Talent Shortages . Cybersecurity is the theme of many of these changes, and even though recent events have highlighted a need for more security, it’s not a new demand. Many parts of the tech world experience talent shortages, despite an educational push towards tech interests in general.
  • 13. While there are many general programmers, technicians, engineers and analysts, they aren’t always specific to a need. While cybersecurity started as a networking focus with a bit of coding experience, it is very much an independent study that needs specialists for the time being–and there aren’t enough of them quite yet.
  • 14. Bigger Cybersecurity Spending More security risks means more spending on security. Whether due to compliance requirements or simply not wanting millions of dollars in digital and productivity damage, companies have increased security-specific spending.
  • 15. Hiring security talent, buying security services, and upgrading hardware are the more popular spending areas. Companies also need to plan for if–not when–a breach happens by purchasing cyber incident insurance.  This form of business insurance provides coverage in the event of cyber theft, data breaches, or other cyber events. Paying out settlements, buying credit monitoring for exposed victims, and litigation costs are often main coverage points.
  • 16. While security is at the forefront of 2020, there are many technological advancements and scientific endeavors to keep in mind. Contact a cybersecurity expert to discuss other tech points, or to secure your tech assets.
  • 17. THANK YOU FOR YOUR TIME Please visit shawnnutley.net.