Cyber Security Threats & Trends - The digital world faces "storms" of dormant malware, hidden backdoors, and evolving phishing campaigns [2] - Cyber attackers operate silently, gathering credentials and exfiltrating information, waiting for the opportune moment to strike [4] - Cyber attacks have evolved from individual hobbyists to organized criminal groups with economic, political, or ideological motives [5] - Artificial intelligence (AI) is being used by attackers to automate attacks more efficiently, reducing compromise time by a factor of ten [19][20] - AI also lowers the barrier to entry for attackers by providing access to expertise and malware creation capabilities, reducing the need for external purchases [20][21] - Attackers are shifting focus to social engineering, using voice cloning technology to impersonate authority figures and trick users into divulging sensitive information [21][22] Incident Response & Recovery - Incident response involves transforming catastrophic events into learning opportunities to foster competence, synergy, and knowledge within an organization [9] - In a real-world case, a company with multi-billion dollar revenue experienced a complete infrastructure shutdown due to encryption [10] - The company had approximately 30 locations worldwide, half of which were production sites, leading to widespread disruption [11] - A compromised production file was partially recovered, allowing for the creation of code to restore production across the company's infrastructure [13][14][15] - Even with production restored, the company was still considered a "survivor" due to the extensive damage to other departments and compromised trust with clients and suppliers [16][17][18] Recommendations & Future Considerations - Individuals should be wary of unverified information sources online due to the potential for disinformation campaigns using manipulated video, audio, and images [26] - It is crucial to educate oneself on the proper use of digital tools and to manage personal and others' data carefully [27] - Individuals should develop critical thinking skills and avoid relying solely on AI-generated responses [29]
Cybersecurity. Come spopravvivere alle tempeste. | Nicolas Fasolo | TEDxLakeComo
TEDx Talks·2025-12-09 17:28