SlideShare una empresa de Scribd logo
1 de 51
 
Introduction ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
The  Hype Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
The  Reality Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th  Century.  We didn’t realize how the car would transform society until later that century…
About  Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logical  Evolution Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Scope Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber  Technology Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Converged  Mobile Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
Behavioral  Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Cyber Security  Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
The Dynamic   Perimeter Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation
Threat   Management Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
Threat   Patterns Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Threat   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber  Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
Multi- Dimensional Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
Cyber   Architecture Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Holistic   Lifecycle Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
Practice   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
A New   Lexicon Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
Collective   Intelligence Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Behavioral   Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Zombification   Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
Cyber   Assurance Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber   Fracking Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
We are  Teksouth ,[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
The TEC  Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Vision Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  CYBER Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  Contact Information ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation

Más contenido relacionado

La actualidad más candente

“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 

La actualidad más candente (20)

“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Similar a The Future of Cyber Security

Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxAdvance Tech
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionCognizant
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...Anil
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015Vinay Mummigatti
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnil Kumar
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 

Similar a The Future of Cyber Security (20)

The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
188
188188
188
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological Evolution
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 

Más de Stephen Lahanas

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroStephen Lahanas
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesStephen Lahanas
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyStephen Lahanas
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & SearchStephen Lahanas
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture FrameworksStephen Lahanas
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesStephen Lahanas
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1Stephen Lahanas
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorxStephen Lahanas
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewStephen Lahanas
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Stephen Lahanas
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems IntegrationStephen Lahanas
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsStephen Lahanas
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionStephen Lahanas
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference ArchitectureStephen Lahanas
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIStephen Lahanas
 

Más de Stephen Lahanas (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political Ontology
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & Search
 
Semantic intelligence
Semantic intelligenceSemantic intelligence
Semantic intelligence
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem Spaces
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorx
 
Virtual Trade Mission
Virtual Trade MissionVirtual Trade Mission
Virtual Trade Mission
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
 
Dynamic Learning
Dynamic LearningDynamic Learning
Dynamic Learning
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP Solutions
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture Fusion
 
Policy Integration
Policy IntegrationPolicy Integration
Policy Integration
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference Architecture
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOI
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

The Future of Cyber Security

  • 1.  
  • 2.
  • 3. Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
  • 4.
  • 5. Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
  • 6.
  • 7. Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th Century. We didn’t realize how the car would transform society until later that century…
  • 8.
  • 9.
  • 10. Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Quantum Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
  • 16.
  • 17.
  • 18.
  • 19. Predictive Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 20.
  • 21.
  • 22. Cyber Security Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
  • 23.
  • 24. Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 25.
  • 26. Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
  • 27.
  • 28.
  • 29. Cyber Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
  • 30.
  • 31. Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
  • 32.
  • 33.
  • 34. Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
  • 35.
  • 36. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
  • 37.
  • 38. Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
  • 39.
  • 40.
  • 41. Zombification Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
  • 42.
  • 43.
  • 44.
  • 45. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
  • 46.
  • 47. The TEC Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 48.
  • 49.
  • 50.
  • 51.