Community Platform
Interests
  • Customer relationship management (CRM)
  • Cyber-security
  • Data analytics
  • E-commerce
  • more...
This Year
555 Points
Total
555 Points
MIS Badge

Click here
to validate the recipient

2024 Cyber Threat Intelligence Trends and Predictions

Thu Nguyen CISA, CRMA, CPDSE, Thu Nguyen is an Associate Vice President at Wells Fargo working as part of the Audit Leadership Management Team. She serves on Temple University’s Information Technology, Auditing and Cybersecurity (ITACS) graduate program’s Industry Advisory Council and teaches the program’s IT Governance and IT Audit Capstone courses. Mrs. Nguyen has 30+ years of consulting, risk management, and audit experience; and has held leadership and management positions with Verizon, Lincoln Financial, Tokyo Marine, Capital One, Capital One and other companies; and is a board member of ISACA Philadelphia.

We went over an overview of geopolitical ransomware, cloud instruction, and emerging technology like deepfakes, as well as an overview of DDOS ransomware.

We then went over a trend forecast, detailing diplomatic disputes, military conflict, and lack of enforcement of cyber laws. Indicators of new trends are new hacktivist groups, large scale disinformation campaigns, and cyber attacks targeting critical infrastructure.

DDOS attacks are common in countries with conflicts, with Russia seeing the most activity. These conflicts have led to aid packages being sent to assist with the issues.

Data breaches are often disguised as \”as a service\” offerings. these attacks often target some sort of service provider, which can put all of its users at risk. governments are taking action to deter ransomware and lower the profit per victim per attack.

Supply chain groups are often the target of these attacks. Some reasons for this are use of 3rd party software and vulnerability of open source software. ransomware tends to target enterprise cloud implementations. Some indicators to look for in 2024 would be the increasing amount of attacks on cloud services and reports from companies of attacks.

Cloud intrusion is when there is a misconfiguration or a vulnerable area in the infrastructure and actors exploit these vulnerabilities to gain access to cloud infrastructure.

In order to defend against social engineering attacks, its important to be vigilant in guarding your personal information. It is also essential to pick up on clues that scammers use, like trying to move a conversation on their preferred platform. To be the safest, individuals should not trust anyone they have recently met on the internet.

As someone who is interested in going into a career in cyber security, I found this webinar helpful in giving context to current events in the cyber security industry.

Skip to toolbar