A BRIEF LOOK AT
CYBERSECURITY ISSUES OVER
TIME
Wayne Schepens
INTRODUCTION
• At LaunchTech Communications in Baltimore, managing director
Wayne Schepens and his team assist new and established
companies in getting their messages in front of the public.
Drawing on Wayne Schepens’ more than 20 years in the field of
cybersecurity, the firm focuses on serving clients in the high-
technology and security sectors.
Cybersecurity has emerged over the current generation as one of
the most important professions in the world. With cybersecurity
acknowledged as vital to both national security and economic
strength, its experts routinely work to counteract destabilizing
efforts on the part of nation-states and independent actors.
Security has been of concern to the computer industry since the
first cumbersome ENIAC and UNIVAC machines debuted in the
1940s and ‘50s.
CYBERSECURITY ISSUES
• Since then, the skills of hackers and virus-makers have increased
exponentially. A simple “phreaking” operation in the early ‘70s
used a toy whistle to produce the exact tone that would facilitate
free telephone calls. In the 1980s, the widespread adoption of
personal computers brought with it the possibility of infection
from viruses such as the boot virus Brain, which in 1985 was the
first to employ stealth technology. And the year 1988, when the
Internet Worm infected 10 percent of all Internet-connected
computers, saw the introduction of a new meaning for the word
“hacker.”
Today’s cybersecurity teams continue to seek innovative ways to
provide protection against cyber-crime, insulate critical grid
infrastructure from attacks, and increase the safety of individual
citizens.

More Related Content

PDF
Michael jarmark protecting consumers
PDF
ACS Newsletter 20 years Feb 2015
PPTX
aap3 cybersecurity recruitment capabilities
PPT
2009 05 18 sdp bbn talk
PPTX
PDF
Blackhat USA Mobile Security Panel 2011
PPT
SEO Company Dallas TX
PPTX
Ethicalhacking
Michael jarmark protecting consumers
ACS Newsletter 20 years Feb 2015
aap3 cybersecurity recruitment capabilities
2009 05 18 sdp bbn talk
Blackhat USA Mobile Security Panel 2011
SEO Company Dallas TX
Ethicalhacking

What's hot (9)

PDF
Antivirus offer
PPTX
Antivirus offer
PPT
Cybercrime
PPT
Hacking
PDF
Russian Trade Mission, the art of new business development
DOCX
Cybersecurity at school - SPANISH TEAM
DOCX
Torres,M Jennifer
PDF
Yuvee press release 2007.2 announcing Yuvee exhibiting at Texas Wireless Summit
PDF
Happy Doughnut Day!
Antivirus offer
Antivirus offer
Cybercrime
Hacking
Russian Trade Mission, the art of new business development
Cybersecurity at school - SPANISH TEAM
Torres,M Jennifer
Yuvee press release 2007.2 announcing Yuvee exhibiting at Texas Wireless Summit
Happy Doughnut Day!
Ad

Similar to A Brief Look at Cybersecurity Issues Over Time (20)

PDF
The History of Cybersecurity - Servnet.pdf
PPTX
Introduction to Cyber Security
PPTX
Cyber security.pptx
PPSX
Computer hacking and security - Social Responsibility of IT Professional by M...
PPTX
Evolution of Hacking- Ronit Chakraborty .pptx
PDF
The art of being a lady in a hacking world
PPT
Cyberterrorism final
PDF
The Most Innovative Cyber Security Leaders to Watch in 2023.pdf
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
ODP
John Yessis - Telecom and Security
PDF
40 under 40 in cybersecurity. top cyber news magazine
PDF
40 under 40 in Cybersecurity year 2022.pdf
PDF
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
PDF
Beza belayneh information_warfare_brief
PPTX
Cyber Security – Indian Perspective.pptx
PPTX
Cyber security
PDF
Cyber Threat to Public Safety Communications
PDF
Agenda PWC Cybersecurity Day - 18 octobre 2016
PDF
Cyber Threat to Public Safety Communications
PDF
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
The History of Cybersecurity - Servnet.pdf
Introduction to Cyber Security
Cyber security.pptx
Computer hacking and security - Social Responsibility of IT Professional by M...
Evolution of Hacking- Ronit Chakraborty .pptx
The art of being a lady in a hacking world
Cyberterrorism final
The Most Innovative Cyber Security Leaders to Watch in 2023.pdf
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
John Yessis - Telecom and Security
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in Cybersecurity year 2022.pdf
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
Beza belayneh information_warfare_brief
Cyber Security – Indian Perspective.pptx
Cyber security
Cyber Threat to Public Safety Communications
Agenda PWC Cybersecurity Day - 18 octobre 2016
Cyber Threat to Public Safety Communications
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Ad

More from Wayne Schepens (15)

PDF
Bridging the Cybersecurity Workforce Gap
PDF
An Overview of Cyber Risk Management
PDF
Digital Marketing Trends in 2023
PPTX
LaunchTech Named Agency of the Year at Global Excellence Awards
PPTX
Communications Tips from the PR Pros in Thrive Global
PPTX
Dow Planetarium Transformed into Science-Informed Tech Center
PPTX
LaunchTech Communications Listed among Baltimore's Top PR Firms
PPTX
The American Heart Association Commends Congress
PPTX
Including Social Media in a Marketing Strategy
PPTX
Using Social Media for PR
PPTX
Cyber Security
PPTX
Wayne Schepens: Novel Interior Design in Sustainable, Prefabricated Packages
PPTX
WayneWright Construction, LLC
PPT
Wayne Schepens: CyberMaryland Hosts Cybersecurity Meeting
PPT
A unique style in wayne wright construction, llc presentation
Bridging the Cybersecurity Workforce Gap
An Overview of Cyber Risk Management
Digital Marketing Trends in 2023
LaunchTech Named Agency of the Year at Global Excellence Awards
Communications Tips from the PR Pros in Thrive Global
Dow Planetarium Transformed into Science-Informed Tech Center
LaunchTech Communications Listed among Baltimore's Top PR Firms
The American Heart Association Commends Congress
Including Social Media in a Marketing Strategy
Using Social Media for PR
Cyber Security
Wayne Schepens: Novel Interior Design in Sustainable, Prefabricated Packages
WayneWright Construction, LLC
Wayne Schepens: CyberMaryland Hosts Cybersecurity Meeting
A unique style in wayne wright construction, llc presentation

Recently uploaded (20)

PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Five Habits of High-Impact Board Members
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Configure Apache Mutual Authentication
DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PDF
Architecture types and enterprise applications.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPT
Geologic Time for studying geology for geologist
OpenACC and Open Hackathons Monthly Highlights July 2025
Module 1.ppt Iot fundamentals and Architecture
Five Habits of High-Impact Board Members
Enhancing plagiarism detection using data pre-processing and machine learning...
Configure Apache Mutual Authentication
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
Architecture types and enterprise applications.pdf
UiPath Agentic Automation session 1: RPA to Agents
Benefits of Physical activity for teenagers.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Final SEM Unit 1 for mit wpu at pune .pptx
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Consumable AI The What, Why & How for Small Teams.pdf
Build Your First AI Agent with UiPath.pptx
The influence of sentiment analysis in enhancing early warning system model f...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Geologic Time for studying geology for geologist

A Brief Look at Cybersecurity Issues Over Time

  • 1. A BRIEF LOOK AT CYBERSECURITY ISSUES OVER TIME Wayne Schepens
  • 2. INTRODUCTION • At LaunchTech Communications in Baltimore, managing director Wayne Schepens and his team assist new and established companies in getting their messages in front of the public. Drawing on Wayne Schepens’ more than 20 years in the field of cybersecurity, the firm focuses on serving clients in the high- technology and security sectors. Cybersecurity has emerged over the current generation as one of the most important professions in the world. With cybersecurity acknowledged as vital to both national security and economic strength, its experts routinely work to counteract destabilizing efforts on the part of nation-states and independent actors. Security has been of concern to the computer industry since the first cumbersome ENIAC and UNIVAC machines debuted in the 1940s and ‘50s.
  • 3. CYBERSECURITY ISSUES • Since then, the skills of hackers and virus-makers have increased exponentially. A simple “phreaking” operation in the early ‘70s used a toy whistle to produce the exact tone that would facilitate free telephone calls. In the 1980s, the widespread adoption of personal computers brought with it the possibility of infection from viruses such as the boot virus Brain, which in 1985 was the first to employ stealth technology. And the year 1988, when the Internet Worm infected 10 percent of all Internet-connected computers, saw the introduction of a new meaning for the word “hacker.” Today’s cybersecurity teams continue to seek innovative ways to provide protection against cyber-crime, insulate critical grid infrastructure from attacks, and increase the safety of individual citizens.