SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Siber Güvenlik ?
Bilgi Güvenliği ?
BT Güvenliği ?
A. Burak Sadıç
1995
2003-2013
2014 yılında katıldığı
PricewaterhouseCoopers Türkiye ofisinde
Bilgi Güvenliği ve Siber Güvenlik
Hizmetleri Lideri olarak çalışan Burak’ın
yirmi senelik danışmanlık ve yönetim
deneyimi bulunmaktadır. ODTÜ
Elektrik-Elektronik Mühendisliği
bölümünden 1995 yılında mezun olan
Burak, PwC öncesinde sırasıyla PDI-
Erkom, Siemens, Meteksan, Koç.net,
Innova ve Symantec bünyesinde çeşitli
kademelerde çalıştı. Symantec'teki 10
yıllık iş yaşamının son dört yılında ise
Güneydoğu Avrupa'daki 12 ülke ve
Türkiye'yi kapsayan bölgedeki
danışmanlık ekiplerini yönetti.
2014-…
2
3
4
5
6
7
8
9
10
Türkiye’deki gelişmeler
11
12
13
14
“There are known knowns; there are
things we know we know. We also
know there are known unknowns, that
is to say we know there are some
things we do not know. But there are
also unknown unknowns – the ones
we don’t know we don’t know.”
Former United States Secretary of
Defense Donald Rumsfeld
February 12, 2002
15
17
18
THREAT HORIZON 2017
Dangers accelerate
19
1. Disruption divides and conquers
Innovation is bringing new opportunities for business, but also malicious
actors that seek to disrupt operations.
1.1 Supercharged connectivity overwhelms defences
Reasonably-priced and superfast gigabit connectivity will provide new business
opportunities. However, it will also open new avenues for criminals to pursue
destructive activity online.
1.2 Crime syndicates take a quantum leap
Criminal organisations will become more sophisticated and migrate many of
their activities online. Organisations will struggle to keep pace and the effects
will be felt around the globe.
1.3 Tech rejectionists cause chaos
In response to socio-economic inequality, ‘tech rejectionists’ will instigate
widespread social unrest and disrupt local economies. Organisations with
supply chains in the affected regions will struggle to cope.
20
1. Disruption divides and conquers
Innovation is bringing new opportunities for business, but also malicious
actors that seek to disrupt operations.
1.1 Supercharged connectivity overwhelms defences
Reasonably-priced and superfast gigabit connectivity will provide new business
opportunities. However, it will also open new avenues for criminals to pursue
destructive activity online.
1.2 Crime syndicates take a quantum leap
Criminal organisations will become more sophisticated and migrate many of
their activities online. Organisations will struggle to keep pace and the effects
will be felt around the globe.
1.3 Tech rejectionists cause chaos
In response to socio-economic inequality, ‘tech rejectionists’ will instigate
widespread social unrest and disrupt local economies. Organisations with
supply chains in the affected regions will struggle to cope.
21
1. Disruption divides and conquers
Innovation is bringing new opportunities for business, but also malicious
actors that seek to disrupt operations.
1.1 Supercharged connectivity overwhelms defences
Reasonably-priced and superfast gigabit connectivity will provide new business
opportunities. However, it will also open new avenues for criminals to pursue
destructive activity online.
1.2 Crime syndicates take a quantum leap
Criminal organisations will become more sophisticated and migrate many of
their activities online. Organisations will struggle to keep pace and the effects
will be felt around the globe.
1.3 Tech rejectionists cause chaos
In response to socio-economic inequality, ‘tech rejectionists’ will instigate
widespread social unrest and disrupt local economies. Organisations with
supply chains in the affected regions will struggle to cope.
22
2. Complexity conceals fragility
A cyberspace congested with people and devices is becoming more complex,
exposing the fragility of the underlying infrastructure.
2.1 Dependence on critical infrastructure becomes dangerous
Whole societies are dependent on ageing, poorly maintained and highly critical
infrastructure. Connectivity failures will force organisations to update their
resilience and invest in technology transformation programmes.
2.2 Systemic vulnerabilities are weaponised
Malicious actors will weaponise systemic vulnerabilities in software systems of
individual technology companies, threatening the integrity of Internet
infrastructure.
2.3 Legacy technology crumbles
As digital connectivity grows, legacy technology will be further exposed to attackers.
The damage from the resultant incidents will exceed anything that has come before.
2.4 Death from disruption to digital services
Disruption of digital systems in transport and medical services will lead to verifiable
deaths. Public pressure forces organisations to respond.
23
2. Complexity conceals fragility
A cyberspace congested with people and devices is becoming more complex,
exposing the fragility of the underlying infrastructure.
2.1 Dependence on critical infrastructure becomes dangerous
Whole societies are dependent on ageing, poorly maintained and highly critical
infrastructure. Connectivity failures will force organisations to update their
resilience and invest in technology transformation programmes.
2.2 Systemic vulnerabilities are weaponised
Malicious actors will weaponise systemic vulnerabilities in software systems of
individual technology companies, threatening the integrity of Internet
infrastructure.
2.3 Legacy technology crumbles
As digital connectivity grows, legacy technology will be further exposed to attackers.
The damage from the resultant incidents will exceed anything that has come before.
2.4 Death from disruption to digital services
Disruption of digital systems in transport and medical services will lead to verifiable
deaths. Public pressure forces organisations to respond.
24
2. Complexity conceals fragility
A cyberspace congested with people and devices is becoming more complex,
exposing the fragility of the underlying infrastructure.
2.1 Dependence on critical infrastructure becomes dangerous
Whole societies are dependent on ageing, poorly maintained and highly critical
infrastructure. Connectivity failures will force organisations to update their
resilience and invest in technology transformation programmes.
2.2 Systemic vulnerabilities are weaponised
Malicious actors will weaponise systemic vulnerabilities in software systems of
individual technology companies, threatening the integrity of Internet
infrastructure.
2.3 Legacy technology crumbles
As digital connectivity grows, legacy technology will be further exposed to attackers.
The damage from the resultant incidents will exceed anything that has come before.
2.4 Death from disruption to digital services
Disruption of digital systems in transport and medical services will lead to verifiable
deaths. Public pressure forces organisations to respond.
25
2. Complexity conceals fragility
A cyberspace congested with people and devices is becoming more complex,
exposing the fragility of the underlying infrastructure.
2.1 Dependence on critical infrastructure becomes dangerous
Whole societies are dependent on ageing, poorly maintained and highly critical
infrastructure. Connectivity failures will force organisations to update their
resilience and invest in technology transformation programmes.
2.2 Systemic vulnerabilities are weaponised
Malicious actors will weaponise systemic vulnerabilities in software systems of
individual technology companies, threatening the integrity of Internet
infrastructure.
2.3 Legacy technology crumbles
As digital connectivity grows, legacy technology will be further exposed to attackers.
The damage from the resultant incidents will exceed anything that has come before.
2.4 Death from disruption to digital services
Disruption of digital systems in transport and medical services will lead to verifiable
deaths. Public pressure forces organisations to respond.
26
3. Complacency bites back
Organisations are too complacent, paying insufficient attention to threats
concealed by international borders.
3.1 Global consolidation endangers competition and security
As the dominant providers of information services expand their global
operations, customers will become more concerned about potential
service disruptions and failures.
3.2 Impact of data breaches increases dramatically
Data breaches will grow in frequency and size, increasing the
operational impact and recovery costs. In response, governments will
introduce additional data protection legislation and regulations.
27
3. Complacency bites back
Organisations are too complacent, paying insufficient attention to threats
concealed by international borders.
3.1 Global consolidation endangers competition and security
As the dominant providers of information services expand their global
operations, customers will become more concerned about potential
service disruptions and failures.
3.2 Impact of data breaches increases dramatically
Data breaches will grow in frequency and size, increasing the
operational impact and recovery costs. In response, governments will
introduce additional data protection legislation and regulations.
28
Teşekkürler...
Füsun Patoğlu
fusun.patoglu@tr.pwc.com
0212 326 6144
burak.sadic @ tr.pwc.com
@adilburaksadic
tr.linkedin.com/in/buraks/

Mais conteúdo relacionado

Mais procurados

Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for SmartgridGruene-it.org
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking IJECEIAES
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 

Mais procurados (20)

Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 

Destaque

ISO 27001 Bilgi Güvenliği Yönetim Sistemi
ISO 27001 Bilgi Güvenliği Yönetim SistemiISO 27001 Bilgi Güvenliği Yönetim Sistemi
ISO 27001 Bilgi Güvenliği Yönetim SistemiEmre ERKIRAN
 
Garnizon dns guvenligi
Garnizon dns guvenligiGarnizon dns guvenligi
Garnizon dns guvenligiAlper Başaran
 
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02Öncü Furkan
 
Beyaz Şapkalı Hacker başlangıç noktası eğitimi
Beyaz Şapkalı Hacker başlangıç noktası eğitimiBeyaz Şapkalı Hacker başlangıç noktası eğitimi
Beyaz Şapkalı Hacker başlangıç noktası eğitimiKurtuluş Karasu
 
KamuNet'e dahil olmak için asgari güvenlik gereksinimleri
KamuNet'e dahil olmak için asgari güvenlik gereksinimleriKamuNet'e dahil olmak için asgari güvenlik gereksinimleri
KamuNet'e dahil olmak için asgari güvenlik gereksinimleriAlper Başaran
 
Bilgi Güvenliği
Bilgi GüvenliğiBilgi Güvenliği
Bilgi Güvenliğisemravural
 
Bilgi Güvenliği Temel Eğitim
Bilgi Güvenliği Temel EğitimBilgi Güvenliği Temel Eğitim
Bilgi Güvenliği Temel EğitimHakan Öztürk
 
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBeyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBGA Cyber Security
 

Destaque (8)

ISO 27001 Bilgi Güvenliği Yönetim Sistemi
ISO 27001 Bilgi Güvenliği Yönetim SistemiISO 27001 Bilgi Güvenliği Yönetim Sistemi
ISO 27001 Bilgi Güvenliği Yönetim Sistemi
 
Garnizon dns guvenligi
Garnizon dns guvenligiGarnizon dns guvenligi
Garnizon dns guvenligi
 
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
 
Beyaz Şapkalı Hacker başlangıç noktası eğitimi
Beyaz Şapkalı Hacker başlangıç noktası eğitimiBeyaz Şapkalı Hacker başlangıç noktası eğitimi
Beyaz Şapkalı Hacker başlangıç noktası eğitimi
 
KamuNet'e dahil olmak için asgari güvenlik gereksinimleri
KamuNet'e dahil olmak için asgari güvenlik gereksinimleriKamuNet'e dahil olmak için asgari güvenlik gereksinimleri
KamuNet'e dahil olmak için asgari güvenlik gereksinimleri
 
Bilgi Güvenliği
Bilgi GüvenliğiBilgi Güvenliği
Bilgi Güvenliği
 
Bilgi Güvenliği Temel Eğitim
Bilgi Güvenliği Temel EğitimBilgi Güvenliği Temel Eğitim
Bilgi Güvenliği Temel Eğitim
 
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBeyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
 

Semelhante a Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forumfloora_jj
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxothmanomar13
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 
The Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future TrendsThe Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future Trendscyberprosocial
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docxjessiehampson
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdfVarinSingh1
 

Semelhante a Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
188
188188
188
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forum
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
The Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future TrendsThe Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future Trends
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 

Mais de CypSec - Siber Güvenlik Konferansı

Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...
Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...
Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...CypSec - Siber Güvenlik Konferansı
 
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle SaldırılarıOnur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle SaldırılarıCypSec - Siber Güvenlik Konferansı
 
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...CypSec - Siber Güvenlik Konferansı
 
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...CypSec - Siber Güvenlik Konferansı
 
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığı
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığıEvren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığı
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığıCypSec - Siber Güvenlik Konferansı
 
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...CypSec - Siber Güvenlik Konferansı
 

Mais de CypSec - Siber Güvenlik Konferansı (14)

Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...
Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...
Minhaç Çelik - Ülkelerin Siber Güvenlik Stratejileri ve Siber Güvenlik Strate...
 
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle SaldırılarıOnur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
 
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...
İsmail Burak Tuğrul - Online Bankacılık Uygulamalarında Karlılaşılan Güvenlik...
 
Yrd. Doç. Dr. Yavuz Erdoğan
Yrd. Doç. Dr. Yavuz ErdoğanYrd. Doç. Dr. Yavuz Erdoğan
Yrd. Doç. Dr. Yavuz Erdoğan
 
Suleyman Özarslan - 2014 Hackerların Yükselişi
Suleyman Özarslan - 2014 Hackerların YükselişiSuleyman Özarslan - 2014 Hackerların Yükselişi
Suleyman Özarslan - 2014 Hackerların Yükselişi
 
Bünyamin Demir - 10 Adımda Yazılım Güvenliği
Bünyamin Demir - 10 Adımda Yazılım GüvenliğiBünyamin Demir - 10 Adımda Yazılım Güvenliği
Bünyamin Demir - 10 Adımda Yazılım Güvenliği
 
Canberk Bolat & Barış Vidin - İzleniyorsunuz
Canberk Bolat & Barış Vidin - İzleniyorsunuzCanberk Bolat & Barış Vidin - İzleniyorsunuz
Canberk Bolat & Barış Vidin - İzleniyorsunuz
 
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...
Huzeyfe Önal - SSL, DPI Kavramları Eşliğinde Internet Trafiği İzleme ve Karşı...
 
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığı
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığıEvren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığı
Evren Yalçın - Fatmagül Ergani - Kurumsal firmalar için hata avcılığı
 
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...
Emre Tınaztepe - FileLocker Zararlıları (Çalışma Mantıkları ve Analiz Yönteml...
 
Can Deger - Ben Heykır Olcam
Can Deger - Ben Heykır OlcamCan Deger - Ben Heykır Olcam
Can Deger - Ben Heykır Olcam
 
Canberk Bolat - Alice Android Diyarında
Canberk Bolat - Alice Android DiyarındaCanberk Bolat - Alice Android Diyarında
Canberk Bolat - Alice Android Diyarında
 
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
 
Bünyamin Demir - Secure YourApp
Bünyamin Demir - Secure YourAppBünyamin Demir - Secure YourApp
Bünyamin Demir - Secure YourApp
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

  • 1. Siber Güvenlik ? Bilgi Güvenliği ? BT Güvenliği ?
  • 2. A. Burak Sadıç 1995 2003-2013 2014 yılında katıldığı PricewaterhouseCoopers Türkiye ofisinde Bilgi Güvenliği ve Siber Güvenlik Hizmetleri Lideri olarak çalışan Burak’ın yirmi senelik danışmanlık ve yönetim deneyimi bulunmaktadır. ODTÜ Elektrik-Elektronik Mühendisliği bölümünden 1995 yılında mezun olan Burak, PwC öncesinde sırasıyla PDI- Erkom, Siemens, Meteksan, Koç.net, Innova ve Symantec bünyesinde çeşitli kademelerde çalıştı. Symantec'teki 10 yıllık iş yaşamının son dört yılında ise Güneydoğu Avrupa'daki 12 ülke ve Türkiye'yi kapsayan bölgedeki danışmanlık ekiplerini yönetti. 2014-…
  • 3. 2
  • 4. 3
  • 5. 4
  • 6. 5
  • 7. 6
  • 8. 7
  • 9. 8
  • 10. 9
  • 11. 10
  • 13. 12
  • 14. 13
  • 15. 14 “There are known knowns; there are things we know we know. We also know there are known unknowns, that is to say we know there are some things we do not know. But there are also unknown unknowns – the ones we don’t know we don’t know.” Former United States Secretary of Defense Donald Rumsfeld February 12, 2002
  • 16. 15
  • 17.
  • 18. 17
  • 20. 19 1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations. 1.1 Supercharged connectivity overwhelms defences Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online. 1.2 Crime syndicates take a quantum leap Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe. 1.3 Tech rejectionists cause chaos In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.
  • 21. 20 1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations. 1.1 Supercharged connectivity overwhelms defences Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online. 1.2 Crime syndicates take a quantum leap Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe. 1.3 Tech rejectionists cause chaos In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.
  • 22. 21 1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations. 1.1 Supercharged connectivity overwhelms defences Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online. 1.2 Crime syndicates take a quantum leap Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe. 1.3 Tech rejectionists cause chaos In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.
  • 23. 22 2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure. 2.1 Dependence on critical infrastructure becomes dangerous Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes. 2.2 Systemic vulnerabilities are weaponised Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure. 2.3 Legacy technology crumbles As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before. 2.4 Death from disruption to digital services Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.
  • 24. 23 2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure. 2.1 Dependence on critical infrastructure becomes dangerous Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes. 2.2 Systemic vulnerabilities are weaponised Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure. 2.3 Legacy technology crumbles As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before. 2.4 Death from disruption to digital services Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.
  • 25. 24 2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure. 2.1 Dependence on critical infrastructure becomes dangerous Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes. 2.2 Systemic vulnerabilities are weaponised Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure. 2.3 Legacy technology crumbles As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before. 2.4 Death from disruption to digital services Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.
  • 26. 25 2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure. 2.1 Dependence on critical infrastructure becomes dangerous Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes. 2.2 Systemic vulnerabilities are weaponised Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure. 2.3 Legacy technology crumbles As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before. 2.4 Death from disruption to digital services Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.
  • 27. 26 3. Complacency bites back Organisations are too complacent, paying insufficient attention to threats concealed by international borders. 3.1 Global consolidation endangers competition and security As the dominant providers of information services expand their global operations, customers will become more concerned about potential service disruptions and failures. 3.2 Impact of data breaches increases dramatically Data breaches will grow in frequency and size, increasing the operational impact and recovery costs. In response, governments will introduce additional data protection legislation and regulations.
  • 28. 27 3. Complacency bites back Organisations are too complacent, paying insufficient attention to threats concealed by international borders. 3.1 Global consolidation endangers competition and security As the dominant providers of information services expand their global operations, customers will become more concerned about potential service disruptions and failures. 3.2 Impact of data breaches increases dramatically Data breaches will grow in frequency and size, increasing the operational impact and recovery costs. In response, governments will introduce additional data protection legislation and regulations.
  • 29. 28
  • 30. Teşekkürler... Füsun Patoğlu fusun.patoglu@tr.pwc.com 0212 326 6144 burak.sadic @ tr.pwc.com @adilburaksadic tr.linkedin.com/in/buraks/