Slide 17
Slide 17 text
Risk Challenges When Addressing Threats
Knowledge of Threats is Growing,
Context of Threats is Not
Ransomware, Drive-by-
download, Injection Attacks,
Phishing, Exploit kits,
botnets, smishing, vishing,
XSS, CSRF, MITM, Trojans
1. What
Hacktivists, Organized Crime Groups,
Fraudsters, Insiders, Nation States,
Corporate Competitors, IP Thievery,
Hacker Cells, Private Vigilantes, PII
Thievery, Defacement, Defamation,
Corporate Espionage
2. Who | Why
Companies caught flat footed
on how exactly attack patterns
translate to either real or
simulated attacks against
various targeted assets,
processes, vendors, or
people.
3. How