The document provides a vision for cyber security in 2021, including emerging technologies, threats, and practices. It predicts that technologies like mobile computing, quantum computing, cloud computing, predictive semantics, and dynamic networks will impact cyber security. Threats will become more sophisticated through cyber warfare, crime, and activism. Cyber security practice will evolve to be more multi-dimensional and holistic through practices like cyber architecture and lifecycle management. A new lexicon for cyber security terms is also envisioned.
Dev Dives: Streamline document processing with UiPath Studio Web
The Future of Cyber Security
1.
2.
3. Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
4.
5. Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
6.
7. Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th Century. We didn’t realize how the car would transform society until later that century…
8.
9.
10. Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
11.
12.
13.
14.
15. Quantum Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
22. Cyber Security Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
26. Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
27.
28.
29. Cyber Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
30.
31. Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
32.
33.
34. Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
35.
36. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
37.
38. Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
39.
40.
41. Zombification Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
42.
43.
44.
45. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
46.
47. The TEC Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation