82626676_xxl

Trends in Cyber Security: A Meeting of the Cyber Minds

Share on facebook
Share on twitter
Share on email

Trends in Cyber Security: A Meeting of the Cyber Minds

At a recent ‘meeting of the cyber minds’ in Ohio, experts from across the cyber world met to discuss the trends that are strongest in the cyber world today – including ransomware, the need for preventing future cyber attacks, and what keeps “the good guys” awake at night when it comes to cyber security and its effect on organizations around the world.

The panelists had a lively and engaging discussion, and dedicated a significant part of the time discussing the dangers and trends in the cyber world today, and the steps that potential students can take to become cyber experts and help bring solutions to resolve these challenges.

The Heart of the Matter: What’s Keeping Everyone Awake at Night…

One theme of the event was that – when it comes to combating cyber – organizations have a real ‘fear of the unknown’, meaning that there is a feeling that once you close one door, another one opens. People looking for holes in your organization are continually looking for new ways to attack, requiring organizations today to constantly be on their toes. Stopping these attacks has become even more difficult with all of the different network points and environments being added these days – such as the move towards the cloud, for example.

Ariel Cohen – CEO of HackerUSA, added that attacks have lately gone a step further, with hackers going so far as to hold hospitals ransom, or attempting to take down airplanes. These types of attacks bring a new and dangerous reality for the challenges associated with defending and protecting against cyber attacks today.

Searching for ‘Hunters’ to Save the Day

After some engaging discussions about the nature of cyber attacks, and the methodologies attackers are now using, Cohen mentioned the growing need for ‘hunters’. This is a relatively new profession in cyber security that requires analysts to search for the ‘crumbs’ that hackers leave behind, even after they take your money. Hackers may for example leave behind their MAC ID, which can lead to other IDs that can help trace their identity and find out where it is that they’re hiding. This is a process that can take months, and requires an elite type of risk manager – someone who should be a data analyst at a very high level, and have high-level mathematical capabilities.

Once these hunters are able to get to the attacker, they can often either find the person directly, or at the very least find out their identity. Many hunters work as freelancers, working on a project basis when the need arises. This field is growing in popularity, and the demand for these types of professionals is increasing rapidly.

The Impact of Bitcoin

The discussion then went to Bitcoin, and how its danger lies in the fact that it cannot be traced. Bitcoin enables privacy, but also eases the ability to steal your money. More and more people will start to take advantage of this vulnerability, which makes Bitcoin a dangerous add-on to today’s currency exchange and its effect on organizations. One point was made, for example, that Bitcoin is not always being used to buy things, but rather to open up a new avenue of criminal activity for hackers.

The panel concluded that new rules will need to be implemented very soon when it comes to Bitcoin, with more detailed information from ISPs required on where Bitcoins are coming from. The thought is that most people will agree that the time has come to stop this dangerous trend, even at the expense of compromising people’s privacy. ISPs are what it will take to help make this happen.

What This All Means for Breaking Into the Cyber Industry

When it comes to breaking into the cyber field, the consensus of the panel members was that getting certified is the key to success. It was also noted that it’s important to sit down and talk with people who are providing cyber security solutions to your customers, as this is a great way to get an inside look at the industry and how it works. Driving security-focused projects, getting into management to manage these types of projects, or joining developer groups looking at various vulnerabilities and how to solve them are all great ways to break into the industry and get started.

Anyone with mathematical potential and who wants to get into a career that can help make the world a safer place is a prime candidate for cyber security. Pen Testing, Cyber Analysts…these are all available at schools that can pre-sort students to see who the best fit is for a particular type of program.

Israeli Knowledge and Expertise, and How it Can Help Lead the Way

The shortage of one million jobs in the cyber field means that the need has never been greater. HackerUSA is uniquely equipped to get students on track with their cyber careers. Established more than 20 years ago, HackerUSA is Israel’s flagship IT and cyber security academy, with credentials as a ‘Microsoft Silver Partner’ and EC-Council accredited institution.

HackerUSA brings a wealth of Israeli experience as a cyber security leader – with Fortune 500, government, military organizations and leading tech companies around the world all looking to HackerUSA for their training needs.

HackerUSA leverages the expertise of Israel’s top cyber security experts, by providing job-oriented programs, pre-training courses, and flexible, personally-customized curricula – with the ability to learn an entire profession in a few months, or over a longer time period requiring only a few hours of study a week.

Learn More

Cyber Security Expert Panel – The Software Guild from The Learning House on Vimeo.

WE WANT TO HEAR FROM YOU

Skip to content