Resources And Talent Constraints:
Why Would Attackers Want To Target Me:
What Is The Right Balance:
1.Speed of cloud adoption
2.Phishing and social engineering
3.Greater privacy and regulatory pressures
4.Increased demand for third-party risk management
5.Cyber insurance will drive demand for risk assessments
6.Missing (and exploitable) patches
7.Unprotected files scatter about
8.Attract and retain talent in a tightening market
9.Cyber attacks by nation states
10.Crime as-a-service
11.Smart devices as a hacking target
12.Zero Trust Replaces VPN
13.AI and machine learning
14.Multiple threat vectors used in attacks
15.Lack of cyber security knowledge
16.Credential compromise
17.Unacknowledged (or unresolved) web flaws
18.Weak incident response procedures