SlideShare a Scribd company logo
1
www.Kahkeshan.com
Future of
Cybersecurity
Economy
• Behnaz Aria
• VP,EDU Manager
• PhD, MBA
MCSA , Master CIW , CTT+,CRISC
ISO 27001 ,ISO 22301 Lead Auditor
ISO 20000 Auditor
ITIL V3.0 Specialist, ITIL V2.0 Service Manager
www.Kahkeshan.com
2
© Behnaz Aria 2017
© Behnaz Aria 2017
3
Advanced Persistent Threat: APT
 Advanced
 Persistent
 Threat
© Behnaz Aria 2017
Targets of APT
Political
Economic
Technical
Military
© Behnaz Aria 2017
4
 Drone Hacking
 Mobile threats
 Ransomware Attacks
 Vulnerability exploits
 Hardware and firmware threats
 IoT malware
 Machine learning : social engineering attacks
 Hacktivists: privacy issues
 Cyber espionage: industry and law enforcement
 Smart Medical Devices and Electronic Medical Records
 Critical Infrastructure cyber attacks
 Cloud computing providers infection
© Behnaz Aria 2017
In 2004, the global cybersecurity market
was worth $3.5 billion
By 2017 it will be worth at least 35X
that amount!
© Behnaz Aria 2017
5
 Many of the problems plaguing
cybersecurity are economic in nature
© Behnaz Aria 2017
Decision makers in industry and
government refusing to take necessary
protections because data explaining
the magnitude and nature of the most
significant threats just isn’t there.
© Behnaz Aria 2017
6
Top 15 statistics in:
© Behnaz Aria 2017
CYBERCRIME
© Behnaz Aria 2017
7
SPENDING
© Behnaz Aria 2017
JOBS
© Behnaz Aria 2017
8
UNEMPLOYMENT
 There are 1 million cybersecurity job openings in
2017, and that is projected to exceed 1.5 million
by 2019. The bobs gap creates opportunity for a
more diverse workforce - a chance for women and
minorities to enter the trillion dollar
cybersecurity field.
© Behnaz Aria 2017
TRAINING
 The security awareness training market is
predicted to reach $10 billion annually by 2027.
Training employees how to recognize and defend
against cyber attacks is the most underspent
sector of the cybersecurity industry.
© Behnaz Aria 2017
9
HEALTHCARE
 Global healthcare cybersecurity spending is
predicted to exceed $65 billion cumulatively over
the next five years, from 2017 to 2021. As the
healthcare industry continues digitizing all of its
information, it continues to attract more
attention from cybercriminals. This dynamic will
be one of many contributors to the growth of the
healthcare security market over the next decade.
© Behnaz Aria 2017
RANSOMWARE
 Ransomware attacks on healthcare are predicted
to quadruple by 2020.
 The biggest cyber threat facing healthcare
providers:ransomware
© Behnaz Aria 2017
10
IDENTITY
 300 billion passwords will require cyber
protection by 2021. The tally includes 100 million
human passwords, and 200 million machine
(Internet of Things) passwords. Some experts
venture the number of passwords may grow even
larger than the recent forecast.
© Behnaz Aria 2017
MOBILE
 Wi-Fi and mobile devices are predicted to account
for nearly 80 percent of IP traffic by 2025. Wi-Fi
and mobile devices will account for 66 percent of
IP traffic by 2020, up from 48% in 2015, according
to Cisco. The shifting traffic landscape will
require CISOs and IT security teams to devote
more resources to mobile security.
© Behnaz Aria 2017
11
EXPLOITS
 Zero-day exploits will rise from one-per-week in
2015 to one-per-day by 2021. Although strides are
being made to produce more secure code through
the use of automation and better tools, the sheer
volume of code being produced is enormous. And
it’s only going to grow exponentially to meet the
thirst for software for web applications, mobile
hardware and devices connected to the Internet
of Things.
© Behnaz Aria 2017
CODE
 111 billion lines of new software code will be
created - and needs to be secured - in 2017. IT
security teams and developers are challenged to
keep up with the rapidly expanding application
attack surface - which is being fueled by a
massively expanding mobile and web app
economy.
© Behnaz Aria 2017
12
HUMANS
 4 billion people are expected to be online - and
need cyber protection - by 2020, up from 2 billion
plus last year. By 2030 the human attack surface
might equal the world's population, which is
projected to reach 8.5 billion by then, up from 7
billion now.
© Behnaz Aria 2017
CYBER-ATTACKS
 Nearly half of all cyber-attacks are committed
against small businesses. Small businesses — who
don’t train their employees on security risks — are
susceptible to the Business Email Compromise
scam (BEC), which the FBI says has led to over $3
billion in losses.
© Behnaz Aria 2017
13
HACKERS
 65 percent of respondents to a poll say black-hat
hackers are more experienced than white-hats.
Black-hats are motivated by money, espionage,
notoriety, and malicious intent… and they are
faster, more daring, and more experienced than
white hats who are constrained by boundaries and
rules.
© Behnaz Aria 2017
 The existence of an information asymmetry does
not necessarily mean that society is not investing
enough in security nor that too much money is
being allocated. Rather, it simply means that we
are likely not investing in the right defenses to
the ideal proportion!
© Behnaz Aria 2017
14
 An economic perspective is essential
for understanding the state of
cybersecurity today, as well as how to
improve it moving forward.
 Raise awareness to cybersecurity issues
and assign responsibility for action
within the private sector so that the
risks to society may be mitigated.
© Behnaz Aria 2017
© Behnaz Aria 2017
15
edu@Kahkeshan.com
© Behnaz Aria 2017
behnazaria
Source: csoonline.com
isaca.org
‫آﻣﻮزش‬ ‫ﺧﻮش‬ ‫ﺗﺠﺮﺑﻪ‬

More Related Content

PPTX
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
 
PDF
50+ facts about State of CyberSecurity in 2015
Marcos Ortiz Valmaseda
 
PPTX
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
 
PPTX
Middle East IoT Workshop
Haider Iqbal
 
PPTX
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Farah Baharuddin
 
PDF
Rpt paradigm shifts
malvvv
 
PDF
Rpt paradigm shifts
malvvv
 
PDF
Global Cyber Security Overview | TechSci Research
TechSci Research
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
 
50+ facts about State of CyberSecurity in 2015
Marcos Ortiz Valmaseda
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
 
Middle East IoT Workshop
Haider Iqbal
 
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Farah Baharuddin
 
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
malvvv
 
Global Cyber Security Overview | TechSci Research
TechSci Research
 

What's hot (20)

PPTX
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
PPT
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
guest446b00
 
PPTX
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
 
PPTX
CyberSecurity.pptx
PranavRaj96
 
PPTX
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
 
PDF
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Haltdos
 
PPTX
Cyberpolicy laws
esther_sonu
 
PDF
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
PDF
NME IT Security Survey 2016
CTM360
 
PDF
Qrator Labs annual report 2017
Qrator Labs
 
PDF
2019 State of Cyber Security Report
Mohamed Zaheer Husain
 
PDF
BLURRING BOUNDARIES
- Mark - Fullbright
 
PDF
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
 
PDF
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
PDF
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
ArabNet ME
 
PDF
Why is cyber security a disruption in the digital economy
Mark Albala
 
PDF
Business inSecurity
Eboney Brown
 
PDF
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
Raaj Khanna
 
PPTX
Vodqa why cybersecurity
Dileep Bellamkonda
 
PDF
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
 
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
guest446b00
 
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
 
CyberSecurity.pptx
PranavRaj96
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Haltdos
 
Cyberpolicy laws
esther_sonu
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
NME IT Security Survey 2016
CTM360
 
Qrator Labs annual report 2017
Qrator Labs
 
2019 State of Cyber Security Report
Mohamed Zaheer Husain
 
BLURRING BOUNDARIES
- Mark - Fullbright
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
ArabNet ME
 
Why is cyber security a disruption in the digital economy
Mark Albala
 
Business inSecurity
Eboney Brown
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
Raaj Khanna
 
Vodqa why cybersecurity
Dileep Bellamkonda
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
 
Ad

Similar to Future of Cyber-security Economy (20)

PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
PDF
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
PPTX
Strategies to Combat New, Innovative Cyber Threats - 2017
PaladionNetworks01
 
PDF
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Matthew Rosenquist
 
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
Matthew Rosenquist
 
PDF
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
PDF
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
PDF
Cyber risk reporting aicpa framework
James Deiotte
 
PDF
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
PPTX
Cyber security fundamentals & ethical hacking
ervaijnathgoler
 
PDF
Fall2015SecurityShow
Adam Heller
 
PPTX
Security Challenges and Innovative Solutions for Securing a Complex World
InfotecsGmbH
 
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
PPTX
Top 15 security predictions for 2017
Accelerate Tech
 
PDF
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
PPTX
The Future of Cybersecurity courses.pptx
RykaBhatt
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Strategies to Combat New, Innovative Cyber Threats - 2017
PaladionNetworks01
 
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Matthew Rosenquist
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
Matthew Rosenquist
 
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
Cyber risk reporting aicpa framework
James Deiotte
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
Cyber security fundamentals & ethical hacking
ervaijnathgoler
 
Fall2015SecurityShow
Adam Heller
 
Security Challenges and Innovative Solutions for Securing a Complex World
InfotecsGmbH
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Top 15 security predictions for 2017
Accelerate Tech
 
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
The Future of Cybersecurity courses.pptx
RykaBhatt
 
Ad

Recently uploaded (20)

PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Doc9.....................................
SofiaCollazos
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
The Future of Artificial Intelligence (AI)
Mukul
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 

Future of Cyber-security Economy

  • 1. 1 www.Kahkeshan.com Future of Cybersecurity Economy • Behnaz Aria • VP,EDU Manager • PhD, MBA MCSA , Master CIW , CTT+,CRISC ISO 27001 ,ISO 22301 Lead Auditor ISO 20000 Auditor ITIL V3.0 Specialist, ITIL V2.0 Service Manager www.Kahkeshan.com
  • 2. 2 © Behnaz Aria 2017 © Behnaz Aria 2017
  • 3. 3 Advanced Persistent Threat: APT  Advanced  Persistent  Threat © Behnaz Aria 2017 Targets of APT Political Economic Technical Military © Behnaz Aria 2017
  • 4. 4  Drone Hacking  Mobile threats  Ransomware Attacks  Vulnerability exploits  Hardware and firmware threats  IoT malware  Machine learning : social engineering attacks  Hacktivists: privacy issues  Cyber espionage: industry and law enforcement  Smart Medical Devices and Electronic Medical Records  Critical Infrastructure cyber attacks  Cloud computing providers infection © Behnaz Aria 2017 In 2004, the global cybersecurity market was worth $3.5 billion By 2017 it will be worth at least 35X that amount! © Behnaz Aria 2017
  • 5. 5  Many of the problems plaguing cybersecurity are economic in nature © Behnaz Aria 2017 Decision makers in industry and government refusing to take necessary protections because data explaining the magnitude and nature of the most significant threats just isn’t there. © Behnaz Aria 2017
  • 6. 6 Top 15 statistics in: © Behnaz Aria 2017 CYBERCRIME © Behnaz Aria 2017
  • 7. 7 SPENDING © Behnaz Aria 2017 JOBS © Behnaz Aria 2017
  • 8. 8 UNEMPLOYMENT  There are 1 million cybersecurity job openings in 2017, and that is projected to exceed 1.5 million by 2019. The bobs gap creates opportunity for a more diverse workforce - a chance for women and minorities to enter the trillion dollar cybersecurity field. © Behnaz Aria 2017 TRAINING  The security awareness training market is predicted to reach $10 billion annually by 2027. Training employees how to recognize and defend against cyber attacks is the most underspent sector of the cybersecurity industry. © Behnaz Aria 2017
  • 9. 9 HEALTHCARE  Global healthcare cybersecurity spending is predicted to exceed $65 billion cumulatively over the next five years, from 2017 to 2021. As the healthcare industry continues digitizing all of its information, it continues to attract more attention from cybercriminals. This dynamic will be one of many contributors to the growth of the healthcare security market over the next decade. © Behnaz Aria 2017 RANSOMWARE  Ransomware attacks on healthcare are predicted to quadruple by 2020.  The biggest cyber threat facing healthcare providers:ransomware © Behnaz Aria 2017
  • 10. 10 IDENTITY  300 billion passwords will require cyber protection by 2021. The tally includes 100 million human passwords, and 200 million machine (Internet of Things) passwords. Some experts venture the number of passwords may grow even larger than the recent forecast. © Behnaz Aria 2017 MOBILE  Wi-Fi and mobile devices are predicted to account for nearly 80 percent of IP traffic by 2025. Wi-Fi and mobile devices will account for 66 percent of IP traffic by 2020, up from 48% in 2015, according to Cisco. The shifting traffic landscape will require CISOs and IT security teams to devote more resources to mobile security. © Behnaz Aria 2017
  • 11. 11 EXPLOITS  Zero-day exploits will rise from one-per-week in 2015 to one-per-day by 2021. Although strides are being made to produce more secure code through the use of automation and better tools, the sheer volume of code being produced is enormous. And it’s only going to grow exponentially to meet the thirst for software for web applications, mobile hardware and devices connected to the Internet of Things. © Behnaz Aria 2017 CODE  111 billion lines of new software code will be created - and needs to be secured - in 2017. IT security teams and developers are challenged to keep up with the rapidly expanding application attack surface - which is being fueled by a massively expanding mobile and web app economy. © Behnaz Aria 2017
  • 12. 12 HUMANS  4 billion people are expected to be online - and need cyber protection - by 2020, up from 2 billion plus last year. By 2030 the human attack surface might equal the world's population, which is projected to reach 8.5 billion by then, up from 7 billion now. © Behnaz Aria 2017 CYBER-ATTACKS  Nearly half of all cyber-attacks are committed against small businesses. Small businesses — who don’t train their employees on security risks — are susceptible to the Business Email Compromise scam (BEC), which the FBI says has led to over $3 billion in losses. © Behnaz Aria 2017
  • 13. 13 HACKERS  65 percent of respondents to a poll say black-hat hackers are more experienced than white-hats. Black-hats are motivated by money, espionage, notoriety, and malicious intent… and they are faster, more daring, and more experienced than white hats who are constrained by boundaries and rules. © Behnaz Aria 2017  The existence of an information asymmetry does not necessarily mean that society is not investing enough in security nor that too much money is being allocated. Rather, it simply means that we are likely not investing in the right defenses to the ideal proportion! © Behnaz Aria 2017
  • 14. 14  An economic perspective is essential for understanding the state of cybersecurity today, as well as how to improve it moving forward.  Raise awareness to cybersecurity issues and assign responsibility for action within the private sector so that the risks to society may be mitigated. © Behnaz Aria 2017 © Behnaz Aria 2017
  • 15. 15 [email protected] © Behnaz Aria 2017 behnazaria Source: csoonline.com isaca.org ‫آﻣﻮزش‬ ‫ﺧﻮش‬ ‫ﺗﺠﺮﺑﻪ‬