top of page

Cybersecurity Challenges

•Cybersecurity, information assurance, and resilience are the glues that will keep our world of converged sensors and algorithms operational. This has become one of the largest areas of government spending at all agencies and is consistently ranked the top priority among government and industry CIOs  in surveys.

•In the U.S. and Globally, most (approximately 85 per cent of the cybersecurity critical infrastructure including defense, oil and gas, electric power grids, healthcare, utilities, communications, transportation, banking, and finance is owned by the private sector and regulated by the public sector. 2014 was the year of the breach for many large corporations in a variety of sectors.


The Changing Threat Environment

Threats:  Online Privacy, Cyber-crime, Social media, Cyber-terrorism

•Dynamic Threat Environment:  Malware/spyware, viruses/worms, phishing emails, Denial of Service attacks (becoming exponentially more powerful and efficient), compliance risks

•More targeted, persistent, sophisticated attacks global in destination as well as origination

* 30% of attacks come from spear-phishing

•40% of attacks come from insiders

•Hacking (Advanced Persistent Threats , APT – focused, well-supported, sophisticated)

* Security patches are not enough, protecting data more complicated as new devices, mobile phones, tablets enter the market.  Connectivity is greater.

Malicious attacks, accidents, natural disasters

* DHS Tracked over 200,000 attacks on critical infrastructure

* Over 40% of corporations reportedly breached

bottom of page