Cybersecurity trends - What to expect in 2023

PECB
PECB PECB
Cybersecurity trends - What to expect in 2023
Agenda
1. Introductions
2. Top Cyber Trends for 2023
3. Q&A
Introduction
Madhu Maganti, CPA, CISA
 20+ years in Cybersecurity/Risk &
Compliance
 Partner in the Risk Advisory practice
within Baker Tilly, an international
CPA and advisory firm.
Introduction
Colleen Lennox
 25+ years experience in business
development & recruiting
 Founder of Cyber Job Central, a
recruitment platform for
cybersecurity related jobs
Employees continue to pose the greatest threat to cybersecurity
People Remain A Risk
• Phishing attacks continue to be one of the main causes of data breaches.
• Access controls can help reduce this risk, but organizations must continue to invest
in awareness training and building a cybersecurity-oriented culture.
New privacy regulations lead to higher burden on organizations
• Several states have already passed their
own set of privacy requirements, with
many more on the way.
• Organizations will need hire dedicated
GRC staff and maintain a compliance
matrix for privacy obligations on a state-
by-state basis.
This includes foreign requirements
such as GDPR, PIPEDA, and more.
Increased Compliance Requirements
High level of M&A in the security space
• Security vendors are focusing on refining their own software instead of
developing new features.
New features are added to existing security software through acquisitions.
• This allows organizations to outsource tasks to fewer security vendors and
reduce the burden of IT staff in managing those vendors.
Even when outsourcing security functions, it’s important that an organization still
maintains in-house experienced cybersecurity staff to manage the vendors.
Vendor Consolidation
Leaders are expected to place a higher priority on cyber risk
• Despite economic uncertainty, spending
on cybersecurity is still expected to
increase, as funding for other areas may
slow.
Leaders are recognizing the value of
cybersecurity, and prioritizing risk
mitigation efforts.
• Many leaders are seeking budget-
friendly cybersecurity investments to
help reduce risks.
• At the same time, cybercrime is
expected to reach record highs.
Prioritization of Cyber Risk
Economic uncertainty results in budget cuts and increased risks
• Although security spending is projected to
increase, leaders may not be comfortable
spending the amount required to mitigate
cybersecurity risks.
• This includes additional experienced security
staff, employee training, advanced
cybersecurity tools, process improvements,
and more.
Budget Constraints
• Over the past 2 years, the top 20 cyber
insurers have had record high loss
rates.
• Insurance providers will seek to better
quantify risks using security data and
risk modeling techniques.
• More thorough security assessments
and increased security requirements
will help keep policy holders safe.
Cyber Insurance
Insurance will quantify risks
Healthcare providers will remain the highest priority target.
• Medical data remains some of the most
sought-after information on the black
market.
• Use of emerging technologies in the medical
field creates additional vulnerabilities for
healthcare providers.
• Other industries with time-sensitive
operations, sensitive data, financial
information, and poor security will also be
prioritized.
Industry Specific Attacks
Many IT teams are struggling to keep everything up-to-date
• Many IT teams either lack the means or the
know-how to keep up with current patches for all
systems used by their organization.
The Ponemon institute found that 64% of
organizations are looking to hire more IT staff for
patch management.
• In the current environment, hiring and retaining
experienced IT staff can be difficult.
• Outdated software can lead to vulnerabilities and
increase the risk of a data breach.
More Software Patches
More businesses will adopt zero trust to mitigate risks
• Zero trust means that every stage of a digital interaction will be validated.
This prevents unauthorized users from freely moving around systems, networks,
and applications.
• Organizations are relying on Identity and Access management software and
combining it with other security solutions to manage and monitor access
across all IT systems.
Zero Trust Adoption
The government may begin talks on how to protect businesses
• Ransomware and other cyberattacks are a
growing threat for US Businesses.
Payment is often the only way out for an
unprepared organization.
• Though it’s unlikely that the government
will pass any legislation this year, they may
begin discussions on how to protect US
based businesses.
Government Intervention
Phishing attacks are being designed with MFA in mind
• New phishing techniques are designed with
MFA in mind – tricking employees into
granting access to the attacker.
• While MFA can make breaching a system more
difficult, it is not a catch-all security measure
that guarantees the prevention of
unauthorized access.
MFA Aware Phishing
Image by storyset on Freepik
THANK YOU
Q&A
colleenlennox
madhumaganticpa
madhu.maganti@bakertilly.com
Colleen.Lennox@cyberjobcentral.com
Baker Tilly US, LLP, trading as Baker Tilly is a member of the global network of Baker Tilly
International Ltd., the members of which are separate and independent legal entities.
The content in this presentation is a resource for Baker Tilly US, LLP clients and prospective
clients. The information provided here is of a general nature and is not intended to address the
specific circumstances of any individual or entity. In specific circumstances, the services of a
professional should be sought. Tax information, if any, contained in this communication was not
intended or written to be used by any person for the purpose of avoiding penalties, nor should
such information be construed as an opinion upon which any person may rely.
The intended recipients of this communication and any attachments are not subject to any
limitation on the disclosure of the tax treatment or tax structure of any transaction or matter that
is the subject of this communication and any attachments.
© 2023 Baker Tilly US, LLP
Disclosure
1 de 17

Recomendados

Cyber Security PPT - 2023.pptx por
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxChandanChandu928137
3.3K visualizações14 slides
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri... por
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
2.5K visualizações16 slides
cyber security presentation.pptx por
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
11.7K visualizações88 slides
Cybercrime and Security por
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.5K visualizações26 slides
Cyber Security Incident Response por
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
11K visualizações85 slides
Cybersecurity por
CybersecurityCybersecurity
CybersecurityANGIEPAEZ304
849 visualizações10 slides

Mais conteúdo relacionado

Mais procurados

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi... por
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
1.7K visualizações22 slides
CYBER SECURITY por
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1.1K visualizações22 slides
Cyber security por
Cyber securityCyber security
Cyber securitySapna Patil
3.2K visualizações13 slides
NIST CyberSecurity Framework: An Overview por
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
49.7K visualizações39 slides
Cyber security awareness por
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
8.1K visualizações32 slides
Introduction to cyber security amos por
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
3.1K visualizações19 slides

Mais procurados(20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi... por Edureka!
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!1.7K visualizações
CYBER SECURITY por PranjalShah18
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah181.1K visualizações
Cyber security por Sapna Patil
Cyber securityCyber security
Cyber security
Sapna Patil3.2K visualizações
NIST CyberSecurity Framework: An Overview por Tandhy Simanjuntak
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak49.7K visualizações
Cyber security awareness por Jason Murray
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray8.1K visualizações
Introduction to cyber security amos por Amos Oyoo
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo3.1K visualizações
Advanced Cybersecurity Risk Management: How to successfully address your Cybe... por PECB
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB 2.4K visualizações
Cyber kill chain por Ankita Ganguly
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly3.8K visualizações
Cyber Security Governance por Priyanka Aash
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash2.4K visualizações
Information Security Risk Management por Ersoy AKSOY
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY9K visualizações
Cybersecurity 2 cyber attacks por sommerville-videos
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos15.2K visualizações
Security operations center-SOC Presentation-مرکز عملیات امنیت por ReZa AdineH
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH6.2K visualizações
Cyber security and demonstration of security tools por Vicky Fernandes
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes2.6K visualizações
Security Policies and Standards por primeteacher32
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher3214K visualizações
Cyber Security A Challenges For Mankind por Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K visualizações
Threat Hunting - Moving from the ad hoc to the formal por Priyanka Aash
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash1K visualizações
Cybersecurity 1. intro to cybersecurity por sommerville-videos
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos29.6K visualizações
NIST cybersecurity framework por Shriya Rai
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai1K visualizações
Cyber security ppt por CH Asim Zubair
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair977 visualizações
CYBER SECURITY por Vaishak Chandran
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran2.6K visualizações

Similar a Cybersecurity trends - What to expect in 2023

A CIRO's-eye view of Digital Risk Management por
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
1.8K visualizações3 slides
managed-security-for-a-not-so-secure-world-wp090991 por
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
61 visualizações4 slides
Master Data in the Cloud: 5 Security Fundamentals por
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
109 visualizações6 slides
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full... por
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
5.3K visualizações8 slides
Cybersecurity crisis management a prep guide por
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
1.4K visualizações36 slides
Digital trust and cyber challenge now extends beyond the Enterprise por
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
445 visualizações34 slides

Similar a Cybersecurity trends - What to expect in 2023(20)

A CIRO's-eye view of Digital Risk Management por Daren Dunkel
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel1.8K visualizações
managed-security-for-a-not-so-secure-world-wp090991 por Jim Romeo
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
Jim Romeo61 visualizações
Master Data in the Cloud: 5 Security Fundamentals por Sarah Fane
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane109 visualizações
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full... por Accenture Technology
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology5.3K visualizações
Cybersecurity crisis management a prep guide por JoAnna Cheshire
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire1.4K visualizações
Digital trust and cyber challenge now extends beyond the Enterprise por Mourad Khalil
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
Mourad Khalil445 visualizações
Cybersecurity through the Deloitte lens por aakash malhotra
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
aakash malhotra112 visualizações
A Look at Cyber Insurance -- A Corporate Perspective por Dawn Yankeelov
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov374 visualizações
Cover and CyberSecurity Essay por Michael Solomon
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon195 visualizações
Strategic Cybersecurity por ScottMadden, Inc.
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
ScottMadden, Inc.665 visualizações
Managed Security For A Not So Secure World Wp090991 por Erik Ginalick
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick334 visualizações
Law Firm Hacked by Cyber Criminals por Richard Brzakala
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
Richard Brzakala92 visualizações
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs por SurfWatch Labs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs671 visualizações
Responding to a Data Breach, Communications Guidelines for Merchants por - Mark - Fullbright
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright897 visualizações
Best practices to mitigate data breach risk por Livingstone Advisory
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory548 visualizações
Top 5 Cybersecurity Trends in 2021 and Beyond por Nandita Nityanandam
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
Nandita Nityanandam130 visualizações
2016 Risk Management Workshop por Stacy Willis
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis420 visualizações
Cybersecurity in the Boardroom por Marko Suswanto
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto1.6K visualizações
2015 IA survey - Protiviti por Simone Luca Giargia
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
Simone Luca Giargia991 visualizações

Mais de PECB

ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
673 visualizações18 slides
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help? por
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
1.5K visualizações52 slides
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie... por
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
1K visualizações22 slides
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu... por
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
1.3K visualizações93 slides
Student Information Session University KTMC por
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
21 visualizações9 slides
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a... por
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
235 visualizações23 slides

Mais de PECB (20)

ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 673 visualizações
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help? por PECB
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB 1.5K visualizações
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie... por PECB
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB 1K visualizações
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu... por PECB
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB 1.3K visualizações
Student Information Session University KTMC por PECB
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB 21 visualizações
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a... por PECB
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB 235 visualizações
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an... por PECB
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB 607 visualizações
Student Information Session University CREST ADVISORY AFRICA por PECB
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB 105 visualizações
Information Session University Egybyte.pptx por PECB
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB 35 visualizações
Student Information Session University Digital Encode.pptx por PECB
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB 40 visualizações
ISO/IEC 27001:2022 – What are the changes? por PECB
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB 5.4K visualizações
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1... por PECB
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
PECB 887 visualizações
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and... por PECB
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB 1.4K visualizações
Business Continuity, Data Privacy, and Information Security: How do they link? por PECB
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB 1.1K visualizações
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference? por PECB
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB 1.1K visualizações
Information Security vs. Data Governance vs. Data Protection: What Is the Rea... por PECB
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB 1.5K visualizações
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701 por PECB
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
PECB 1K visualizações
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map? por PECB
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
PECB 2.6K visualizações
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee... por PECB
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB 1.5K visualizações
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know por PECB
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
PECB 2.2K visualizações

Último

WITS Deck por
WITS DeckWITS Deck
WITS DeckW.I.T.S.
14 visualizações22 slides
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 visualizações24 slides
Marketing and Community Building in Web3 por
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 visualizações64 slides
hamro digital logics.pptx por
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 visualizações36 slides
Affiliate Marketing por
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 visualizações30 slides
ATPMOUSE_융합2조.pptx por
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 visualizações70 slides

Último(10)

WITS Deck por W.I.T.S.
WITS DeckWITS Deck
WITS Deck
W.I.T.S.14 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 visualizações
Marketing and Community Building in Web3 por Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 visualizações
hamro digital logics.pptx por tupeshghimire
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptx
tupeshghimire10 visualizações
Affiliate Marketing por Navin Dhanuka
Affiliate MarketingAffiliate Marketing
Affiliate Marketing
Navin Dhanuka18 visualizações
ATPMOUSE_융합2조.pptx por kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 visualizações
cis5-Project-11a-Harry Lai por harrylai126
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Lai
harrylai1268 visualizações
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 visualizações

Cybersecurity trends - What to expect in 2023

  • 2. Agenda 1. Introductions 2. Top Cyber Trends for 2023 3. Q&A
  • 3. Introduction Madhu Maganti, CPA, CISA  20+ years in Cybersecurity/Risk & Compliance  Partner in the Risk Advisory practice within Baker Tilly, an international CPA and advisory firm.
  • 4. Introduction Colleen Lennox  25+ years experience in business development & recruiting  Founder of Cyber Job Central, a recruitment platform for cybersecurity related jobs
  • 5. Employees continue to pose the greatest threat to cybersecurity People Remain A Risk • Phishing attacks continue to be one of the main causes of data breaches. • Access controls can help reduce this risk, but organizations must continue to invest in awareness training and building a cybersecurity-oriented culture.
  • 6. New privacy regulations lead to higher burden on organizations • Several states have already passed their own set of privacy requirements, with many more on the way. • Organizations will need hire dedicated GRC staff and maintain a compliance matrix for privacy obligations on a state- by-state basis. This includes foreign requirements such as GDPR, PIPEDA, and more. Increased Compliance Requirements
  • 7. High level of M&A in the security space • Security vendors are focusing on refining their own software instead of developing new features. New features are added to existing security software through acquisitions. • This allows organizations to outsource tasks to fewer security vendors and reduce the burden of IT staff in managing those vendors. Even when outsourcing security functions, it’s important that an organization still maintains in-house experienced cybersecurity staff to manage the vendors. Vendor Consolidation
  • 8. Leaders are expected to place a higher priority on cyber risk • Despite economic uncertainty, spending on cybersecurity is still expected to increase, as funding for other areas may slow. Leaders are recognizing the value of cybersecurity, and prioritizing risk mitigation efforts. • Many leaders are seeking budget- friendly cybersecurity investments to help reduce risks. • At the same time, cybercrime is expected to reach record highs. Prioritization of Cyber Risk
  • 9. Economic uncertainty results in budget cuts and increased risks • Although security spending is projected to increase, leaders may not be comfortable spending the amount required to mitigate cybersecurity risks. • This includes additional experienced security staff, employee training, advanced cybersecurity tools, process improvements, and more. Budget Constraints
  • 10. • Over the past 2 years, the top 20 cyber insurers have had record high loss rates. • Insurance providers will seek to better quantify risks using security data and risk modeling techniques. • More thorough security assessments and increased security requirements will help keep policy holders safe. Cyber Insurance Insurance will quantify risks
  • 11. Healthcare providers will remain the highest priority target. • Medical data remains some of the most sought-after information on the black market. • Use of emerging technologies in the medical field creates additional vulnerabilities for healthcare providers. • Other industries with time-sensitive operations, sensitive data, financial information, and poor security will also be prioritized. Industry Specific Attacks
  • 12. Many IT teams are struggling to keep everything up-to-date • Many IT teams either lack the means or the know-how to keep up with current patches for all systems used by their organization. The Ponemon institute found that 64% of organizations are looking to hire more IT staff for patch management. • In the current environment, hiring and retaining experienced IT staff can be difficult. • Outdated software can lead to vulnerabilities and increase the risk of a data breach. More Software Patches
  • 13. More businesses will adopt zero trust to mitigate risks • Zero trust means that every stage of a digital interaction will be validated. This prevents unauthorized users from freely moving around systems, networks, and applications. • Organizations are relying on Identity and Access management software and combining it with other security solutions to manage and monitor access across all IT systems. Zero Trust Adoption
  • 14. The government may begin talks on how to protect businesses • Ransomware and other cyberattacks are a growing threat for US Businesses. Payment is often the only way out for an unprepared organization. • Though it’s unlikely that the government will pass any legislation this year, they may begin discussions on how to protect US based businesses. Government Intervention
  • 15. Phishing attacks are being designed with MFA in mind • New phishing techniques are designed with MFA in mind – tricking employees into granting access to the attacker. • While MFA can make breaching a system more difficult, it is not a catch-all security measure that guarantees the prevention of unauthorized access. MFA Aware Phishing Image by storyset on Freepik
  • 17. Baker Tilly US, LLP, trading as Baker Tilly is a member of the global network of Baker Tilly International Ltd., the members of which are separate and independent legal entities. The content in this presentation is a resource for Baker Tilly US, LLP clients and prospective clients. The information provided here is of a general nature and is not intended to address the specific circumstances of any individual or entity. In specific circumstances, the services of a professional should be sought. Tax information, if any, contained in this communication was not intended or written to be used by any person for the purpose of avoiding penalties, nor should such information be construed as an opinion upon which any person may rely. The intended recipients of this communication and any attachments are not subject to any limitation on the disclosure of the tax treatment or tax structure of any transaction or matter that is the subject of this communication and any attachments. © 2023 Baker Tilly US, LLP Disclosure