Attack Vectors - The Changing Rules of Engagement
The traditional definition of attack vectors has not necessarily evolved. On the other hand, the methods, means and ease of access most certainly have. It is debatable whether it is now easier for exploits to reach the public domain, however their impacts leave little doubts. Ingenuous hackers, each with his own agenda, are constantly sharpening their tools, knowledge and appetite.
Despite all the software and hardware technologies available nowadays, no protection method is totally immune from cyber-attacks. What is effective today, almost inevitably, will not last for long. The role of the security professional has never been so challenging as he or she is the real firewall and intelligence behind protecting the enterprise's assets.
The presentation will review the worldwide geopolitical influence on attack vectors. Are events on the global scene compounding to the impacts or contributing to the rise of cyber-attacks? Should we be concerned about Hacktivists, Cyberwarriors, Cyberterrorists, Cybercriminals? What can the security professional mitigate against?