SlideShare uma empresa Scribd logo
1 de 25
Cosmin Vilcu
Regional Sales Manager
SonicWall
C
Cyber Security Trends 2020
How people imagine the future, 100+ years ago
How people imagine the future, 100+ years ago
The Global Risks Landscape
2019
Source: World Economic Forum Global Risks Perception Survey
2018–2019.
Verizon predictions for 2019
• Contextual privacy will be front and center
• Automation will transform the workforce: Robotic process automation and
machine learning (ML) will transform how business operates
• We’ll go back to basics on security (again), but also focus on specifics: In 2019,
organizations will redouble their efforts to strengthen their security posture. It’s
about understanding their risk environment, and ensuring they are doing the
basics right to protect their business; practicing IT hygiene to keep
infrastructure current to protect against vulnerabilities continues to be critical.
Dangerous Memory Threats & Side-Channel Attacks
Side-channel attacks will be an
ongoing risk to the computing
landscape, which will make
technology that can mitigate these
attacks a critical requirement.
“Spectre is here to stay.”
Google Researchers | February 2019
Processor Vulnerabilities
ZombieLoad
MID-YEAR UPDATE | JULY 2019
2019 SONICWALL
CYBER THREAT REPORT
Arm Your Business with the Latest Threat
Intelligence from the First Half of 2019
1.0M+
Sensors
50+
Industry
research
organizations
in which
intelligence is
shared
24x7x365
Monitoring
< 24 Hr.
Response to
never-before-seen
vulnerabilities
140K+
Malware
samples
collected
daily
28M+
Malware
attacks
blocked
daily
2019 GLOBAL CYBER ARMS RACE
SonicWall recorded more than 4.78
billion malware attacks for the first half
of 2019 — a 20% year-to-date
decrease.
Global malware volume dips to start
2019, but other attack types rebound.
4.78
Billion
5.99
Billion
20191H
20181H
CYBERATTACK TRENDS
As global malware
volume declines,
other attack types
increase during
the first half of 2019.
-20%
MALW ARE
ATTACKS
4.8 BILLION
15%
110.9 MILLION
RANSOMW ARE
ATTACKS
2.0 TRILLION
INTRUSION
ATTEMPTS
4%
76%
2.5 MILLION
ENCRYPTED
THREATS
11%
19.2 MILLION
W EB APP
ATTACKS
55%
13.5 MILLION
IOT
MALW ARE
In 2018, the average
SonicWall customer faced:
SonicWall Security Center: Did You Know?
WORLDWIDE ATTACKS
• ~25,000 malware attacks (+22% over 2017)
• 490 ransomware attacks (+11%)
• 19% of malware using non-standard ports (+9%)
• 9.3 million intrusion attempts (+38%)
• 1,276 encrypted threats (+27%)
• 105K web app attacks (+79%)
• 5,488 phishing attacks
• 392K new attack variants (1,074/day)
detected by Capture ATP
• 74K+ never-before-seen attack variants
identified by RTDMI™
Between January and September 2019,
the average SonicWall customer faced:
• 17,135 malware attacks (-15%)
• 361 ransomware attacks (-5%)
• 135 cryptojacking attacks (-1%)
• 14% of malware using non-standard ports (-13%)
• 7.1 million intrusion attempts (+3%)
• 1,702 encrypted threats (+74%)
• 112,898 web app attacks (+9%)
• 2,740 phishing attacks (-22%)
• ~292K new attack variants (1,061/day) detected by Capture ATP
(+1%)
• ~113K never-before-seen attack variants
identified by RTDMI™ (+222%)
Security Industry Advances Cybercriminal Advances
KEY FINDINGS FROM FIRST HALF OF 2019
Encrypted
Attacks
Intensifying
Bitcoin Value
Keeping
Cryptojacking
in Play
Global
Phishing
Trending Down
Malicious PDF
& Office Files
Briefly Dip
Non-Standard
Ports Still A
Concern
Memory
Threats
Identified Early
Machine
Learning A
‘Must Have’
Ransomware,
RaaS Rising
IoT Attacks
Escalating
Overall
Malware
Down
Security Industry Advances
UK, India
Harden
Against
Ransomware
Cybercriminal Advances
Rise of
Cryptojacking
Memory
Threats
Identified Early
KEY FINDINGS FROM FIRST HALF OF 2019
Encrypted
Attacks
Growing
Phishing
Down, More
Targeted
Malicious PDF
& Office Files
Non-Standard
Ports Ripe for
Exploitation
IoT Attacks
Escalating
Machine
Learning
Maturing
Ransomware
Up Globally
• UK ransomware
down 59%
• NHS attacks in
2017
• India also
down 49%
• First side channels
Meltdown and
Spectre – Jan 2018
• Latest was Spoiler,
Mar 2019
• RTDMI provides
day zero
protection against
future exploits
• Capture ATP
blocked over 390K
new variants in
2018
• RTDMI detected
74K never-before-
seen cyberattacks
in 2018
• 57.5 million
cryptojacking
detections in 2018
• Peaked in Sept
13.1 million
• Subsequent
decline tracks
price of Bitcoin
• 26 million phishing
attacks in 2018,
decline of 4.1%
• Average customer
faced 5,488
phishing attacks
• Phishing spiked
during Nov holiday
season
• Global
ransomware up
11% in 2018
• 206.4 million
attacks globally
• Average customer
attacked 25K times
in 2018
• 34% of threats
found by Capture
ATP in Q4’18 were
PDF/Office
• EXE and Flash are
on the decline
• Ports 80 and 443
are the standard
ports for web
• 19.2% of malware
used non-standard
ports in 2018
• This was up 8.7%
over 2017
• IoT attacks
increased 217%
in 2018 to 32.7
million
• Routers and IP
Cameras the
most commonly
targeted devices
• 31 billion IoT
devices forecast
by 2020
• In 2012, major
websites moved to
100% HTTPS
• In 2018, we saw a
27% increase in
attacks using HTTPS
• Nemucod was 39%
of the malware
using HTTPS
Security Industry Advances
Global Phishing
Trending Down
• 8.3 million phishing
attacks worldwide in 2019
• 19% dip year to date over
2018
• In 2018, SonicWall
recorded 26 million
phishing attacks
worldwide, a 4.1% drop
from 2017
Machine Learning
Now ‘Must-Have’
• Capture ATP discovered
and blocked 194,171 new
attack variants, a 45% year-
to-date increase over 2018
• RTDMI identified 74,360
‘never-before-seen’
malware variants
in 2019
Memory Threats
Identified Early
• First side-channel attacks,
Meltdown and Spectre, in
January 2018
• Latest was Spoiler
in March 2019
• RTDMITM provides zero-
day protection against
future exploits
Overall
Malware Down
• SonicWall recorded
4.78 billion* malware
attacks
• 20% drop compared
to the same time
period last year
• In 2018, SonicWall
logged record 10.52
billion malware attacks
globally
Malicious PDFs & Office
Files Briefly Dip
• 39% of threats found by
Capture ATP in Q1 2019
were PDF/Office
• Volume dropped to 21% in
Q2 2019
• In February and March
2019, 51% and 47% of
‘never-before-seen’
attacks, respectively, came
via PDFs or Office files
Security Industry Advances
UK, India
Harden
Against
Ransomware
Cybercriminal Advances
Rise of
Cryptojacking
Memory
Threats
Identified Early
Encrypted
Attacks
Growing
Phishing
Down, More
Targeted
Malicious PDF
& Office Files
Non-Standard
Ports Ripe for
Exploitation
IoT Attacks
Escalating
Machine
Learning
Maturing
Ransomware
Up Globally
• UK ransomware
down 59%
• NHS attacks in
2017
• India also
down 49%
• First side channels
Meltdown and
Spectre – Jan 2018
• Latest was Spoiler,
Mar 2019
• RTDMI provides
day zero
protection against
future exploits
• Capture ATP
blocked over 390K
new variants in
2018
• RTDMI detected
74K never-before-
seen cyberattacks
in 2018
• 57.5 million
cryptojacking
detections in 2018
• Peaked in Sept
13.1 million
• Subsequent
decline tracks
price of Bitcoin
• 26 million phishing
attacks in 2018,
decline of 4.1%
• Average customer
faced 5,488
phishing attacks
• Phishing spiked
during Nov holiday
season
• Global
ransomware up
11% in 2018
• 206.4 million
attacks globally
• Average customer
attacked 25K times
in 2018
• 34% of threats
found by Capture
ATP in Q4’18 were
PDF/Office
• EXE and Flash are
on the decline
• Ports 80 and 443
are the standard
ports for web
• 19.2% of malware
used non-standard
ports in 2018
• This was up 8.7%
over 2017
• IoT attacks
increased 217%
in 2018 to 32.7
million
• Routers and IP
Cameras the
most commonly
targeted devices
• 31 billion IoT
devices forecast
by 2020
• In 2012, major
websites moved to
100% HTTPS
• In 2018, we saw a
27% increase in
attacks using HTTPS
• Nemucod was 39%
of the malware
using HTTPS
Security Industry Advances
Phishing Down,
More Targeted
• 26 million phishing attacks
in 2018, decline of 4.1%
• Average customer faced
5,488 phishing attacks
• Phishing spiked during Nov
holiday season
Rise of Cryptojacking
• 57.5 million cryptojacking
detections in 2018
• Peaked in Sept 13.1 million
• Subsequent decline tracks
price of Bitcoin
Machine Learning
Maturing
• Capture ATP blocked over
390K new variants in 2018
• RTDMI detected 74K never-
before-seen cyberattacks in
2018
Memory Threats
Identified Early
• First side channels
Meltdown and Spectre –
Jan 2018
• Latest was Spoiler, Mar
2019
• RTDMI provides day zero
protection against future
exploits
UK, India Harden
Against Ransomware
• UK ransomware down
59%
• NHS attacks in 2017
• India also down 49%
Cybercriminal Advances
Ransomware,
RaaS Rising
• Global ransomware
up 15% YTD
• 110.9 million attacks
globally through
June 2019
• Average customer faced
263 ransomware attacks
through June 2019
Non-Standard Ports
Still Cause for
Concern
• Ports 80 and 443 are the
standard ports for web
• 13% of malware used
non-standard ports in
2019
• Volume spiked to 20%
in Q2 2019
IoT Attacks
Escalating
• IoT attacks up 55%
YTD in 2019
• IoT attacks increased 217%
in 2018 to 32.7 million
• Routers and IP cameras
most commonly targeted
devices; 31 billion IoT
devices forecast by 2020
Encrypted Threats
Intensifying
• In 2019, 76% increase
in attacks using HTTPS
YTD over 2018
KEY FINDINGS FROM FIRST HALF OF 2019
Bitcoin Value Keeping
Cryptojacking in Play
• Bitcoin surge helping
cryptojacking stay relevant
• Volume passed 52.7
million for the first six
months of the year
• 9% increase over the last
six months of 2018
2020
CYBER SECURITY TRENDS
16
17
According to a Salesforce Research, 27% of European IT
organizations are currently experiencing or anticipate a
current short-term skill gap in Security Areas. Another
33% responded that they don't current have a skill gap,
but they anticipated one within two years.
MSP Security and cloud growth drivers
• Cloud growth was predicted and is
happening
• Providertrust is essential and specific for
Country physical data locations
• Security complexity asks for serviced model
18
Source: Grand View Research
Cybersecurity budgets
• Cybersecurity is at the top of every
corporate executive’s mind.
Companies have already started
increasing investments in data
privacy. Research has found that
cybersecurity budgets have increased
by 141 per cent from 2010 to 2018.
• As a result, global investments in
information security are expected to
total more than $124 billion in 2019.
19
Increased automation in Cyber Security
20
• Automation is a significant advantage in cyber security that has been
gaining a decent footing in the business. A recent Ponemon Institute
survey of more than 1,400 IT and IT security specialists demonstrates
that 79% of respondents either right now use (29%) automation tools
and platforms inside their company or plan to utilize them (50%) within
the next couple of years.
• This development towards the utilization of automation intends to
decrease the weight on understaffed cyber security teams and
increment effectiveness. Nonetheless, it is not an ideal solution all
alone on the grounds that automation tools require gifted and
knowledgeable staff to operate them.
AutomatedReal-TimeBreachDetectionand PreventionTechnology
DEEP LEARNING
ALGORITHM
Machine Learning
Artifact 1
Artifact 2
Artifact 3
Artifact 4
Data File
MS Office
PDF
Streaming Data
Classified Malware
RANSOMWARE
Locky
RANSOMWARE
WannaCry
TROJAN
Spartan
UNKNOWN
CLOUD CAPTURE SANDBOX
Hypervisor
GoodBad BLOCK
until
VERDICT
SENT
Emulation
Virtualization
BLOCK
Analyzed
7.2 billion malware attack attempts
from Jan. 19 to Sept. 19
Memory/RTDMI
Protecting PDFs, MS Office and
Chip-based Processor / Memory
Network
Security
Appliances
Wi-Fi
Cloud
& SaaS
Email
IoT
Endpoints
5G and IoT
• 5G tech is so important because it will make the IoT a
reality.
• The ultra-fast 5G network will allow these devices to
transfer exponentially more information with
download speeds of up to 10Gbps
• The upcoming 5G rollout is one reason why experts
predict that more than 36 billion devices will be
connected to the internet by the end of 2020.
• Unfortunately, all of them will be exposed to security
threats. In fact, research has found that the “first wave
of IoT attacks” already began back in 2016.
• This makes the expanded IoT a nightmare for
cybersecurity experts, who must figure out how to
protect cell phones, security systems, vehicles, smart
homes, and more devices from being breached
22
Shadow IT
• By 2020, 33% of effective attacks
experienced by companies will be on
their shadow IT assets. Business units
manage the truth of the enterprise and
will draw in with any device that
causes them to carry out the
responsibility. Organizations should
figure out how to address shadow IT
and make a culture of
acknowledgment and protection
versus detection and punishment.
23
Cloud as a threat
• By 2020, 80% of new deals for cloud-
based access security brokers
(CASBs) will be bundled with a
network firewall, secure web gateway
(SWG) and web application firewall
(WAF) platforms. While concerns exist
about client migration to the cloud and
bundling buys, organizations should
evaluate the application deployment
guide and choose whether CASB
investment is justified.
24
Thank You | SonicWall.com
Cosmin Vilcu
cvilcu@sonicwall.com
+4 0764 433 310

Mais conteúdo relacionado

Mais procurados

50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015Marcos Ortiz Valmaseda
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 

Mais procurados (20)

50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
188
188188
188
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Semelhante a Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020

Data Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksData Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksWhite Clarke Group
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22CheapSSLsecurity
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxBoni Yeamin
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsArun Kannoth
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 

Semelhante a Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020 (20)

Data Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksData Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacks
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
The Future Of the Internet
The Future Of the Internet The Future Of the Internet
The Future Of the Internet
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 

Mais de Business Days

Anton Rog Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...
Anton Rog   Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...Anton Rog   Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...
Anton Rog Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...Business Days
 
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...Business Days
 
Future trends modern energy management with Frank Katzemich from Apleona
Future trends modern energy management with Frank Katzemich from ApleonaFuture trends modern energy management with Frank Katzemich from Apleona
Future trends modern energy management with Frank Katzemich from ApleonaBusiness Days
 
Modern trends in Facility Management - APLEONA DAY 15 mai 2019
Modern trends in Facility Management - APLEONA DAY 15 mai 2019Modern trends in Facility Management - APLEONA DAY 15 mai 2019
Modern trends in Facility Management - APLEONA DAY 15 mai 2019Business Days
 
Automobilul in economia viitorului Bogdan Apahidean, CEO LeasePlan
Automobilul in economia viitorului   Bogdan Apahidean, CEO LeasePlanAutomobilul in economia viitorului   Bogdan Apahidean, CEO LeasePlan
Automobilul in economia viitorului Bogdan Apahidean, CEO LeasePlanBusiness Days
 
Razvan Zvoristeanu - Harta investitilor in marketing
Razvan Zvoristeanu - Harta investitilor in marketingRazvan Zvoristeanu - Harta investitilor in marketing
Razvan Zvoristeanu - Harta investitilor in marketingBusiness Days
 
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?Business Days
 
Adrian Mironescu - Cum creezi branduri cu suflet?
Adrian Mironescu - Cum creezi branduri cu suflet?Adrian Mironescu - Cum creezi branduri cu suflet?
Adrian Mironescu - Cum creezi branduri cu suflet?Business Days
 
Business focus constanta 2018 scurta prezentare a evenimentului
Business focus constanta 2018 scurta prezentare a evenimentuluiBusiness focus constanta 2018 scurta prezentare a evenimentului
Business focus constanta 2018 scurta prezentare a evenimentuluiBusiness Days
 
STARt in public speaking de Ovidiu Oltean
STARt in public speaking de Ovidiu OlteanSTARt in public speaking de Ovidiu Oltean
STARt in public speaking de Ovidiu OlteanBusiness Days
 
10 sugestii pentru un discurs cu impact de la Ovidiu Oltean
10 sugestii pentru un discurs cu impact de la Ovidiu Oltean10 sugestii pentru un discurs cu impact de la Ovidiu Oltean
10 sugestii pentru un discurs cu impact de la Ovidiu OlteanBusiness Days
 
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...Business Days
 
Madalina Barbu Munca in echipa
Madalina Barbu   Munca in echipaMadalina Barbu   Munca in echipa
Madalina Barbu Munca in echipaBusiness Days
 
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenori
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenoriAdi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenori
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenoriBusiness Days
 
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...Business Days
 
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afacerii
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afaceriiAdi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afacerii
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afaceriiBusiness Days
 
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018Business Days
 
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018Business Days
 
Mihai Bonca - Masterclass Brand strategy - Business Focus Iasi
Mihai Bonca - Masterclass Brand strategy - Business Focus IasiMihai Bonca - Masterclass Brand strategy - Business Focus Iasi
Mihai Bonca - Masterclass Brand strategy - Business Focus IasiBusiness Days
 
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018Business Days
 

Mais de Business Days (20)

Anton Rog Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...
Anton Rog   Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...Anton Rog   Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...
Anton Rog Securitatea cibernetica in industria 4.0 - Cyber Security Trends ...
 
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...
Future trends in Facility Management digitalization - Mark Fitzpatrick - at A...
 
Future trends modern energy management with Frank Katzemich from Apleona
Future trends modern energy management with Frank Katzemich from ApleonaFuture trends modern energy management with Frank Katzemich from Apleona
Future trends modern energy management with Frank Katzemich from Apleona
 
Modern trends in Facility Management - APLEONA DAY 15 mai 2019
Modern trends in Facility Management - APLEONA DAY 15 mai 2019Modern trends in Facility Management - APLEONA DAY 15 mai 2019
Modern trends in Facility Management - APLEONA DAY 15 mai 2019
 
Automobilul in economia viitorului Bogdan Apahidean, CEO LeasePlan
Automobilul in economia viitorului   Bogdan Apahidean, CEO LeasePlanAutomobilul in economia viitorului   Bogdan Apahidean, CEO LeasePlan
Automobilul in economia viitorului Bogdan Apahidean, CEO LeasePlan
 
Razvan Zvoristeanu - Harta investitilor in marketing
Razvan Zvoristeanu - Harta investitilor in marketingRazvan Zvoristeanu - Harta investitilor in marketing
Razvan Zvoristeanu - Harta investitilor in marketing
 
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?
Dan Mocanu si Vlad Diaconu - Cum putem face concurenta irelevanta?
 
Adrian Mironescu - Cum creezi branduri cu suflet?
Adrian Mironescu - Cum creezi branduri cu suflet?Adrian Mironescu - Cum creezi branduri cu suflet?
Adrian Mironescu - Cum creezi branduri cu suflet?
 
Business focus constanta 2018 scurta prezentare a evenimentului
Business focus constanta 2018 scurta prezentare a evenimentuluiBusiness focus constanta 2018 scurta prezentare a evenimentului
Business focus constanta 2018 scurta prezentare a evenimentului
 
STARt in public speaking de Ovidiu Oltean
STARt in public speaking de Ovidiu OlteanSTARt in public speaking de Ovidiu Oltean
STARt in public speaking de Ovidiu Oltean
 
10 sugestii pentru un discurs cu impact de la Ovidiu Oltean
10 sugestii pentru un discurs cu impact de la Ovidiu Oltean10 sugestii pentru un discurs cu impact de la Ovidiu Oltean
10 sugestii pentru un discurs cu impact de la Ovidiu Oltean
 
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...
Lista de verificare al unui vorbitor in public profesionist - de la Ovidiu Ol...
 
Madalina Barbu Munca in echipa
Madalina Barbu   Munca in echipaMadalina Barbu   Munca in echipa
Madalina Barbu Munca in echipa
 
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenori
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenoriAdi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenori
Adi Ploscaru - Accesarea pietei - sesiune speciala pentru antreprenori
 
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...
Mixul de finantare - Adi Ploscaru - workshop de management financiar din cadr...
 
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afacerii
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afaceriiAdi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afacerii
Adi Ploscaru - 5 pasi pentru sanatatea ta financiara si a afacerii
 
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018
Dan Mocanu - Diferentiere prin inovatie - Masterclass - Business Focus Iasi 2018
 
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018
Mihai Bonca - Brand Strategy - Masterclass - Business Focus Iasi 2018
 
Mihai Bonca - Masterclass Brand strategy - Business Focus Iasi
Mihai Bonca - Masterclass Brand strategy - Business Focus IasiMihai Bonca - Masterclass Brand strategy - Business Focus Iasi
Mihai Bonca - Masterclass Brand strategy - Business Focus Iasi
 
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018
Ciprian Moga - 8 moduri de motivare a angajatilor - Business Focus Iasi 2018
 

Último

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 

Último (20)

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 

Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020

  • 1. Cosmin Vilcu Regional Sales Manager SonicWall C Cyber Security Trends 2020
  • 2. How people imagine the future, 100+ years ago
  • 3. How people imagine the future, 100+ years ago
  • 4. The Global Risks Landscape 2019 Source: World Economic Forum Global Risks Perception Survey 2018–2019.
  • 5. Verizon predictions for 2019 • Contextual privacy will be front and center • Automation will transform the workforce: Robotic process automation and machine learning (ML) will transform how business operates • We’ll go back to basics on security (again), but also focus on specifics: In 2019, organizations will redouble their efforts to strengthen their security posture. It’s about understanding their risk environment, and ensuring they are doing the basics right to protect their business; practicing IT hygiene to keep infrastructure current to protect against vulnerabilities continues to be critical.
  • 6. Dangerous Memory Threats & Side-Channel Attacks Side-channel attacks will be an ongoing risk to the computing landscape, which will make technology that can mitigate these attacks a critical requirement. “Spectre is here to stay.” Google Researchers | February 2019 Processor Vulnerabilities ZombieLoad
  • 7. MID-YEAR UPDATE | JULY 2019 2019 SONICWALL CYBER THREAT REPORT Arm Your Business with the Latest Threat Intelligence from the First Half of 2019
  • 8. 1.0M+ Sensors 50+ Industry research organizations in which intelligence is shared 24x7x365 Monitoring < 24 Hr. Response to never-before-seen vulnerabilities 140K+ Malware samples collected daily 28M+ Malware attacks blocked daily
  • 9. 2019 GLOBAL CYBER ARMS RACE SonicWall recorded more than 4.78 billion malware attacks for the first half of 2019 — a 20% year-to-date decrease. Global malware volume dips to start 2019, but other attack types rebound. 4.78 Billion 5.99 Billion 20191H 20181H
  • 10. CYBERATTACK TRENDS As global malware volume declines, other attack types increase during the first half of 2019. -20% MALW ARE ATTACKS 4.8 BILLION 15% 110.9 MILLION RANSOMW ARE ATTACKS 2.0 TRILLION INTRUSION ATTEMPTS 4% 76% 2.5 MILLION ENCRYPTED THREATS 11% 19.2 MILLION W EB APP ATTACKS 55% 13.5 MILLION IOT MALW ARE
  • 11. In 2018, the average SonicWall customer faced: SonicWall Security Center: Did You Know? WORLDWIDE ATTACKS • ~25,000 malware attacks (+22% over 2017) • 490 ransomware attacks (+11%) • 19% of malware using non-standard ports (+9%) • 9.3 million intrusion attempts (+38%) • 1,276 encrypted threats (+27%) • 105K web app attacks (+79%) • 5,488 phishing attacks • 392K new attack variants (1,074/day) detected by Capture ATP • 74K+ never-before-seen attack variants identified by RTDMI™ Between January and September 2019, the average SonicWall customer faced: • 17,135 malware attacks (-15%) • 361 ransomware attacks (-5%) • 135 cryptojacking attacks (-1%) • 14% of malware using non-standard ports (-13%) • 7.1 million intrusion attempts (+3%) • 1,702 encrypted threats (+74%) • 112,898 web app attacks (+9%) • 2,740 phishing attacks (-22%) • ~292K new attack variants (1,061/day) detected by Capture ATP (+1%) • ~113K never-before-seen attack variants identified by RTDMI™ (+222%)
  • 12. Security Industry Advances Cybercriminal Advances KEY FINDINGS FROM FIRST HALF OF 2019 Encrypted Attacks Intensifying Bitcoin Value Keeping Cryptojacking in Play Global Phishing Trending Down Malicious PDF & Office Files Briefly Dip Non-Standard Ports Still A Concern Memory Threats Identified Early Machine Learning A ‘Must Have’ Ransomware, RaaS Rising IoT Attacks Escalating Overall Malware Down
  • 13. Security Industry Advances UK, India Harden Against Ransomware Cybercriminal Advances Rise of Cryptojacking Memory Threats Identified Early KEY FINDINGS FROM FIRST HALF OF 2019 Encrypted Attacks Growing Phishing Down, More Targeted Malicious PDF & Office Files Non-Standard Ports Ripe for Exploitation IoT Attacks Escalating Machine Learning Maturing Ransomware Up Globally • UK ransomware down 59% • NHS attacks in 2017 • India also down 49% • First side channels Meltdown and Spectre – Jan 2018 • Latest was Spoiler, Mar 2019 • RTDMI provides day zero protection against future exploits • Capture ATP blocked over 390K new variants in 2018 • RTDMI detected 74K never-before- seen cyberattacks in 2018 • 57.5 million cryptojacking detections in 2018 • Peaked in Sept 13.1 million • Subsequent decline tracks price of Bitcoin • 26 million phishing attacks in 2018, decline of 4.1% • Average customer faced 5,488 phishing attacks • Phishing spiked during Nov holiday season • Global ransomware up 11% in 2018 • 206.4 million attacks globally • Average customer attacked 25K times in 2018 • 34% of threats found by Capture ATP in Q4’18 were PDF/Office • EXE and Flash are on the decline • Ports 80 and 443 are the standard ports for web • 19.2% of malware used non-standard ports in 2018 • This was up 8.7% over 2017 • IoT attacks increased 217% in 2018 to 32.7 million • Routers and IP Cameras the most commonly targeted devices • 31 billion IoT devices forecast by 2020 • In 2012, major websites moved to 100% HTTPS • In 2018, we saw a 27% increase in attacks using HTTPS • Nemucod was 39% of the malware using HTTPS Security Industry Advances Global Phishing Trending Down • 8.3 million phishing attacks worldwide in 2019 • 19% dip year to date over 2018 • In 2018, SonicWall recorded 26 million phishing attacks worldwide, a 4.1% drop from 2017 Machine Learning Now ‘Must-Have’ • Capture ATP discovered and blocked 194,171 new attack variants, a 45% year- to-date increase over 2018 • RTDMI identified 74,360 ‘never-before-seen’ malware variants in 2019 Memory Threats Identified Early • First side-channel attacks, Meltdown and Spectre, in January 2018 • Latest was Spoiler in March 2019 • RTDMITM provides zero- day protection against future exploits Overall Malware Down • SonicWall recorded 4.78 billion* malware attacks • 20% drop compared to the same time period last year • In 2018, SonicWall logged record 10.52 billion malware attacks globally Malicious PDFs & Office Files Briefly Dip • 39% of threats found by Capture ATP in Q1 2019 were PDF/Office • Volume dropped to 21% in Q2 2019 • In February and March 2019, 51% and 47% of ‘never-before-seen’ attacks, respectively, came via PDFs or Office files
  • 14. Security Industry Advances UK, India Harden Against Ransomware Cybercriminal Advances Rise of Cryptojacking Memory Threats Identified Early Encrypted Attacks Growing Phishing Down, More Targeted Malicious PDF & Office Files Non-Standard Ports Ripe for Exploitation IoT Attacks Escalating Machine Learning Maturing Ransomware Up Globally • UK ransomware down 59% • NHS attacks in 2017 • India also down 49% • First side channels Meltdown and Spectre – Jan 2018 • Latest was Spoiler, Mar 2019 • RTDMI provides day zero protection against future exploits • Capture ATP blocked over 390K new variants in 2018 • RTDMI detected 74K never-before- seen cyberattacks in 2018 • 57.5 million cryptojacking detections in 2018 • Peaked in Sept 13.1 million • Subsequent decline tracks price of Bitcoin • 26 million phishing attacks in 2018, decline of 4.1% • Average customer faced 5,488 phishing attacks • Phishing spiked during Nov holiday season • Global ransomware up 11% in 2018 • 206.4 million attacks globally • Average customer attacked 25K times in 2018 • 34% of threats found by Capture ATP in Q4’18 were PDF/Office • EXE and Flash are on the decline • Ports 80 and 443 are the standard ports for web • 19.2% of malware used non-standard ports in 2018 • This was up 8.7% over 2017 • IoT attacks increased 217% in 2018 to 32.7 million • Routers and IP Cameras the most commonly targeted devices • 31 billion IoT devices forecast by 2020 • In 2012, major websites moved to 100% HTTPS • In 2018, we saw a 27% increase in attacks using HTTPS • Nemucod was 39% of the malware using HTTPS Security Industry Advances Phishing Down, More Targeted • 26 million phishing attacks in 2018, decline of 4.1% • Average customer faced 5,488 phishing attacks • Phishing spiked during Nov holiday season Rise of Cryptojacking • 57.5 million cryptojacking detections in 2018 • Peaked in Sept 13.1 million • Subsequent decline tracks price of Bitcoin Machine Learning Maturing • Capture ATP blocked over 390K new variants in 2018 • RTDMI detected 74K never- before-seen cyberattacks in 2018 Memory Threats Identified Early • First side channels Meltdown and Spectre – Jan 2018 • Latest was Spoiler, Mar 2019 • RTDMI provides day zero protection against future exploits UK, India Harden Against Ransomware • UK ransomware down 59% • NHS attacks in 2017 • India also down 49% Cybercriminal Advances Ransomware, RaaS Rising • Global ransomware up 15% YTD • 110.9 million attacks globally through June 2019 • Average customer faced 263 ransomware attacks through June 2019 Non-Standard Ports Still Cause for Concern • Ports 80 and 443 are the standard ports for web • 13% of malware used non-standard ports in 2019 • Volume spiked to 20% in Q2 2019 IoT Attacks Escalating • IoT attacks up 55% YTD in 2019 • IoT attacks increased 217% in 2018 to 32.7 million • Routers and IP cameras most commonly targeted devices; 31 billion IoT devices forecast by 2020 Encrypted Threats Intensifying • In 2019, 76% increase in attacks using HTTPS YTD over 2018 KEY FINDINGS FROM FIRST HALF OF 2019 Bitcoin Value Keeping Cryptojacking in Play • Bitcoin surge helping cryptojacking stay relevant • Volume passed 52.7 million for the first six months of the year • 9% increase over the last six months of 2018
  • 16. 16
  • 17. 17 According to a Salesforce Research, 27% of European IT organizations are currently experiencing or anticipate a current short-term skill gap in Security Areas. Another 33% responded that they don't current have a skill gap, but they anticipated one within two years.
  • 18. MSP Security and cloud growth drivers • Cloud growth was predicted and is happening • Providertrust is essential and specific for Country physical data locations • Security complexity asks for serviced model 18 Source: Grand View Research
  • 19. Cybersecurity budgets • Cybersecurity is at the top of every corporate executive’s mind. Companies have already started increasing investments in data privacy. Research has found that cybersecurity budgets have increased by 141 per cent from 2010 to 2018. • As a result, global investments in information security are expected to total more than $124 billion in 2019. 19
  • 20. Increased automation in Cyber Security 20 • Automation is a significant advantage in cyber security that has been gaining a decent footing in the business. A recent Ponemon Institute survey of more than 1,400 IT and IT security specialists demonstrates that 79% of respondents either right now use (29%) automation tools and platforms inside their company or plan to utilize them (50%) within the next couple of years. • This development towards the utilization of automation intends to decrease the weight on understaffed cyber security teams and increment effectiveness. Nonetheless, it is not an ideal solution all alone on the grounds that automation tools require gifted and knowledgeable staff to operate them.
  • 21. AutomatedReal-TimeBreachDetectionand PreventionTechnology DEEP LEARNING ALGORITHM Machine Learning Artifact 1 Artifact 2 Artifact 3 Artifact 4 Data File MS Office PDF Streaming Data Classified Malware RANSOMWARE Locky RANSOMWARE WannaCry TROJAN Spartan UNKNOWN CLOUD CAPTURE SANDBOX Hypervisor GoodBad BLOCK until VERDICT SENT Emulation Virtualization BLOCK Analyzed 7.2 billion malware attack attempts from Jan. 19 to Sept. 19 Memory/RTDMI Protecting PDFs, MS Office and Chip-based Processor / Memory Network Security Appliances Wi-Fi Cloud & SaaS Email IoT Endpoints
  • 22. 5G and IoT • 5G tech is so important because it will make the IoT a reality. • The ultra-fast 5G network will allow these devices to transfer exponentially more information with download speeds of up to 10Gbps • The upcoming 5G rollout is one reason why experts predict that more than 36 billion devices will be connected to the internet by the end of 2020. • Unfortunately, all of them will be exposed to security threats. In fact, research has found that the “first wave of IoT attacks” already began back in 2016. • This makes the expanded IoT a nightmare for cybersecurity experts, who must figure out how to protect cell phones, security systems, vehicles, smart homes, and more devices from being breached 22
  • 23. Shadow IT • By 2020, 33% of effective attacks experienced by companies will be on their shadow IT assets. Business units manage the truth of the enterprise and will draw in with any device that causes them to carry out the responsibility. Organizations should figure out how to address shadow IT and make a culture of acknowledgment and protection versus detection and punishment. 23
  • 24. Cloud as a threat • By 2020, 80% of new deals for cloud- based access security brokers (CASBs) will be bundled with a network firewall, secure web gateway (SWG) and web application firewall (WAF) platforms. While concerns exist about client migration to the cloud and bundling buys, organizations should evaluate the application deployment guide and choose whether CASB investment is justified. 24
  • 25. Thank You | SonicWall.com Cosmin Vilcu cvilcu@sonicwall.com +4 0764 433 310