SlideShare una empresa de Scribd logo
1 de 51
 
Introduction ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
The  Hype Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
The  Reality Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th  Century.  We didn’t realize how the car would transform society until later that century…
About  Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logical  Evolution Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Scope Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber  Technology Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Converged  Mobile Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
Behavioral  Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Cyber Security  Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
The Dynamic   Perimeter Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation
Threat   Management Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
Threat   Patterns Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Threat   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber  Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
Multi- Dimensional Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
Cyber   Architecture Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Holistic   Lifecycle Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
Practice   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
A New   Lexicon Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
Collective   Intelligence Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Behavioral   Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Zombification   Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
Cyber   Assurance Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber   Fracking Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
We are  Teksouth ,[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
The TEC  Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Vision Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  CYBER Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  Contact Information ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation

Más contenido relacionado

La actualidad más candente

Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
System security
System securitySystem security
System security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar a The Future of Cyber Security

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxAdvance Tech
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionCognizant
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...Anil
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015Vinay Mummigatti
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnil Kumar
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 

Similar a The Future of Cyber Security (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
188
188188
188
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological Evolution
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 

Más de Stephen Lahanas

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroStephen Lahanas
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesStephen Lahanas
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyStephen Lahanas
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & SearchStephen Lahanas
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture FrameworksStephen Lahanas
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesStephen Lahanas
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1Stephen Lahanas
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorxStephen Lahanas
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewStephen Lahanas
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Stephen Lahanas
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems IntegrationStephen Lahanas
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsStephen Lahanas
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionStephen Lahanas
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference ArchitectureStephen Lahanas
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIStephen Lahanas
 

Más de Stephen Lahanas (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political Ontology
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & Search
 
Semantic intelligence
Semantic intelligenceSemantic intelligence
Semantic intelligence
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem Spaces
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorx
 
Virtual Trade Mission
Virtual Trade MissionVirtual Trade Mission
Virtual Trade Mission
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
 
Dynamic Learning
Dynamic LearningDynamic Learning
Dynamic Learning
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP Solutions
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture Fusion
 
Policy Integration
Policy IntegrationPolicy Integration
Policy Integration
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference Architecture
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOI
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

The Future of Cyber Security

  • 1.  
  • 2.
  • 3. Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
  • 4.
  • 5. Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
  • 6.
  • 7. Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th Century. We didn’t realize how the car would transform society until later that century…
  • 8.
  • 9.
  • 10. Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Quantum Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
  • 16.
  • 17.
  • 18.
  • 19. Predictive Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 20.
  • 21.
  • 22. Cyber Security Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
  • 23.
  • 24. Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 25.
  • 26. Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
  • 27.
  • 28.
  • 29. Cyber Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
  • 30.
  • 31. Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
  • 32.
  • 33.
  • 34. Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
  • 35.
  • 36. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
  • 37.
  • 38. Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
  • 39.
  • 40.
  • 41. Zombification Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
  • 42.
  • 43.
  • 44.
  • 45. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
  • 46.
  • 47. The TEC Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 48.
  • 49.
  • 50.
  • 51.