ocp webinar.PNG
bb2.PNG
uber-hack.jpg

Joe Sullivan, a prominent security expert, spent the first eight years of his career working for the Department of Justice, first as an intern at the DOJ Miami office. He prosecuted cybercrimes for the San Francisco U.S. attorney’s office, working with Robert Mueller, then as Assistant United States Attorney at the District of Nevada in Las Vegas, and worked as Assistant US Attorney at the Northern District of California. Sullivan was the top security officer at Facebook, Uber, and Cloudflare, and a Commissioner for Obama Cyber Commission. Next, he faced his previous employer U.S. attorney’s office – this time as a defendant charged with obstruction of justice for concealing a 2016 breach of Uber customer and driver records from the Federal Trade Commission and for actively hiding a felony.

Social Media.JPG

Data is predicted to grow at a 23% CAGR from now until 2025. Internet of Things (IOT) and Social Media are the two biggest growth factors contributing to this data expansion. Competition for the connected vehicle space has become crowded as Apple and Google are becoming involved in vehicle programming, alongside both established car companies and the myriad of electric automotive startup companies. These companies view the car as a smartphone on wheels, and are eager to gain a piece of the pie.

Yet despite all of this, social media is growing and connecting people from all around the world in ways which were not possible before now. Perhaps social media companies will be able to tweak their algorithms, and/or change the way that they interact with users to make the platforms healthier for everyone.

AdobeStock_125729273.jpeg

What can organizations do to improve their cybersecurity posture?

Educate all employees on security

Protecting the edge is partly about ensuring that the edge users (ie. your employees) are following cybersecurity best practices. These include:

  • Ensuring that all passwords are durable and changed routinely

  • Using password screen-locking and device tracking for all mobile devices

  • Don’t give out personal information, usernames or passwords when asked via email

  • 46% of cybersecurity leaders target improved security awareness training as something that they would like to invest in if they had more funds available.

  • 82% of breaches involved the human element, including Social Attacks, Errors, and Misuse. - Verizon Data Breach Report