Cybersecurity in 2022
Gabe Schuyler
The state of attack & defense
Austin Forum on Technology and Society


March 1, 2022
Agenda
• Going remote


• Cloud computing


• Automation


• Zero-days


• Internet of things
• Ransom


• Supply chain


• Nation-state actors


• Armed Con
fl
ict


• Q & A
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Gabe Schuyler
• Enterprise Solutions Engineer at Wiz, Inc.


• Long time operations person


• Medium time cybersecurity professional


• Also into wireless hacking, RFID tags, and


using technology for positive social change.


@gabe_sky
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Going remote
• Lock-down


• Bring your own device


• Borrow your work device


• Segment your networks


• Protect all endpoints


• "I'm not a cat"
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Cloud computing
• Cheap and remote


• Unsecured resources


• Crypto-mining


• Cloud security posture management


• Inventory and monitoring


• Department of transportation
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Automation
• Criminals are lazy


• Brute force


• Large-scale phishing


• Password managers and MFA


• Automated response


• Honeypots
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Zero-day and zero-click exploits
• No patch to stop it


• Lucrative job, selling


• Effective against well-defended


• Defense in depth


• Incentivize updates and patches


• NSO group
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Internet of Things
• Valuable data and orchestration


• Firmware updates rare/never


• Stepping stone inside


• Change default passwords


• Segment networks


• Hacked by a
fi
sh tank
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Ransomware
• Lucrative and automatable


• Ransomware as a service


• Double-ransom


• Backups


• Insurance


• Colonial pipeline
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Supply Chain
• Applications "borrow" code


• Enterprises use diverse software


• Often opaque to developers


• Automate security in development process


• Defense in depth & zero trust


• SolarWinds
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Nation states
• Rare but unstoppable


• Disruption and misinformation


• Espionage


• Listen to CISA (and NSA?)


• Insurance ("Acts of War")


• Chinese warship on pause
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Armed Con
fl
ict
• Conspicuously quiet


• DDoS and defacement


• Disinformation


• Trusted sources, veri
fi
ed information


• Protect against splash damage


• Current insanity
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Q & A
Gabe Schuyler


@gabe_sky
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler

More Related Content

PPT
software-security.ppt
PDF
Cyber security training
PDF
Computer Security Threats
PPT
Building An Information Security Awareness Program
PPTX
Cyber security
PPTX
cyber security presentation.pptx
ODP
Cyber security awareness
PPTX
Network Security Risk
software-security.ppt
Cyber security training
Computer Security Threats
Building An Information Security Awareness Program
Cyber security
cyber security presentation.pptx
Cyber security awareness
Network Security Risk

What's hot (20)

PDF
European Cybersecurity Context
PPT
Ethical hacking
PPT
Social engineering and Phishing
PPTX
Cyber Security in Society
PPTX
Cybercrime and Security
PDF
OWASP Top Ten in Practice
PPT
Hacking
PPTX
Cyber security
PPT
Ethical Hacking Powerpoint
ODP
OWASP Secure Coding
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Ethical hacking
PDF
Overview of Information Security & Privacy
PDF
End-User Security Awareness
PDF
Cyber security
PPTX
Cyber Security A Challenges For Mankind
PPTX
Cybersecurity Awareness Training
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Cyber security presentation
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
European Cybersecurity Context
Ethical hacking
Social engineering and Phishing
Cyber Security in Society
Cybercrime and Security
OWASP Top Ten in Practice
Hacking
Cyber security
Ethical Hacking Powerpoint
OWASP Secure Coding
Cybersecurity 1. intro to cybersecurity
Ethical hacking
Overview of Information Security & Privacy
End-User Security Awareness
Cyber security
Cyber Security A Challenges For Mankind
Cybersecurity Awareness Training
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber security presentation
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Ad

Similar to Cybersecurity in 2022 (20)

PDF
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
PDF
2023 BSides ATX Trending Attack and Defense.pdf
PPTX
5G Networks - What's next for Broadband
PDF
2022 GrrCON Shifting Right with Policy as Code.pdf
PDF
3rd International Conference on Soft Computing, Data mining and Data Science ...
PDF
Call for Papers - 3rd International Conference on Soft Computing, Data mining...
PDF
3rd International Conference on Computing and Information Technology (CITE 2025)
PDF
3rd International Conference on Computing and Information Technology (CITE 2025)
PDF
3rd International Conference on Soft Computing, Data mining and Data Science ...
PDF
5G overview for ISEM 2022_Maria Boura_A.pdf
PDF
How to protect your data
PDF
How to protect your data
PPT
Have the Bad Guys Won the Cyber security War...
PPT
Quant & Crypto Gold
PDF
2nd International Conference on Computer Science and Information Technology A...
PDF
2nd International Conference on Computer Science and Information Technology A...
PDF
International Conference on Blockchain, Cybersecurity and Internet of Things ...
PDF
International Conference on Blockchain, Cybersecurity and Internet of Things ...
PDF
International Conference on Blockchain, Cybersecurity and Internet of Things ...
PDF
3rd International Conference on Computing and Information Technology (CITE 2025)
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
2023 BSides ATX Trending Attack and Defense.pdf
5G Networks - What's next for Broadband
2022 GrrCON Shifting Right with Policy as Code.pdf
3rd International Conference on Soft Computing, Data mining and Data Science ...
Call for Papers - 3rd International Conference on Soft Computing, Data mining...
3rd International Conference on Computing and Information Technology (CITE 2025)
3rd International Conference on Computing and Information Technology (CITE 2025)
3rd International Conference on Soft Computing, Data mining and Data Science ...
5G overview for ISEM 2022_Maria Boura_A.pdf
How to protect your data
How to protect your data
Have the Bad Guys Won the Cyber security War...
Quant & Crypto Gold
2nd International Conference on Computer Science and Information Technology A...
2nd International Conference on Computer Science and Information Technology A...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
3rd International Conference on Computing and Information Technology (CITE 2025)
Ad

More from Gabriel Schuyler (11)

PDF
2024 Kernelcon Attack and Defense of AI.pdf
PDF
Trends in Cloud Security Attack & Defense
PDF
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
PDF
Automating Security Tests in Development with Docker
PDF
Dog Days of Devops 2022: Policy as Code
PDF
fwd:cloudsec 2022: Shifting right with policy-as-code
PDF
Hope 2022: Just Enough RFID Cloning to be Dangerous
PDF
Kernel Con 2022: Securing Cloud Native Workloads
PPTX
ShmooCon 2022: RFID Key Cloning for Angry Bikers
PDF
Migrating Puppet 3 to 4 -- Code Changes
PDF
IC3 -- Configuration Management 101
2024 Kernelcon Attack and Defense of AI.pdf
Trends in Cloud Security Attack & Defense
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Automating Security Tests in Development with Docker
Dog Days of Devops 2022: Policy as Code
fwd:cloudsec 2022: Shifting right with policy-as-code
Hope 2022: Just Enough RFID Cloning to be Dangerous
Kernel Con 2022: Securing Cloud Native Workloads
ShmooCon 2022: RFID Key Cloning for Angry Bikers
Migrating Puppet 3 to 4 -- Code Changes
IC3 -- Configuration Management 101

Recently uploaded (20)

PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
Understand the Gitlab_presentation_task.pdf
PPT
12 Things That Make People Trust a Website Instantly
PPTX
TITLE DEFENSE entitle the impact of social media on education
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Reading as a good Form of Recreation
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Mathew Digital SEO Checklist Guidlines 2025
Exploring VPS Hosting Trends for SMBs in 2025
Exploring The Internet Of Things(IOT).ppt
AI_Cyberattack_Solutions AI AI AI AI .pptx
Cyber Hygine IN organizations in MSME or
Alethe Consulting Corporate Profile and Solution Aproach
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Introduction to cybersecurity and digital nettiquette
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Understand the Gitlab_presentation_task.pdf
12 Things That Make People Trust a Website Instantly
TITLE DEFENSE entitle the impact of social media on education
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Reading as a good Form of Recreation
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Layers_of_the_Earth_Grade7.pptx class by
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟

Cybersecurity in 2022

  • 1. Cybersecurity in 2022 Gabe Schuyler The state of attack & defense Austin Forum on Technology and Society March 1, 2022
  • 2. Agenda • Going remote • Cloud computing • Automation • Zero-days • Internet of things • Ransom • Supply chain • Nation-state actors • Armed Con fl ict • Q & A @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 3. Gabe Schuyler • Enterprise Solutions Engineer at Wiz, Inc. • Long time operations person • Medium time cybersecurity professional • Also into wireless hacking, RFID tags, and 
 using technology for positive social change. @gabe_sky @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 4. Going remote • Lock-down • Bring your own device • Borrow your work device 
 • Segment your networks • Protect all endpoints 
 • "I'm not a cat" @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 5. Cloud computing • Cheap and remote • Unsecured resources • Crypto-mining 
 • Cloud security posture management • Inventory and monitoring 
 • Department of transportation @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 6. Automation • Criminals are lazy • Brute force • Large-scale phishing 
 • Password managers and MFA • Automated response 
 • Honeypots @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 7. Zero-day and zero-click exploits • No patch to stop it • Lucrative job, selling • Effective against well-defended 
 • Defense in depth • Incentivize updates and patches 
 • NSO group @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 8. Internet of Things • Valuable data and orchestration • Firmware updates rare/never • Stepping stone inside 
 • Change default passwords • Segment networks 
 • Hacked by a fi sh tank @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 9. Ransomware • Lucrative and automatable • Ransomware as a service • Double-ransom 
 • Backups • Insurance 
 • Colonial pipeline @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 10. Supply Chain • Applications "borrow" code • Enterprises use diverse software • Often opaque to developers 
 • Automate security in development process • Defense in depth & zero trust 
 • SolarWinds @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 11. Nation states • Rare but unstoppable • Disruption and misinformation • Espionage 
 • Listen to CISA (and NSA?) • Insurance ("Acts of War") 
 • Chinese warship on pause @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 12. Armed Con fl ict • Conspicuously quiet • DDoS and defacement • Disinformation 
 • Trusted sources, veri fi ed information • Protect against splash damage 
 • Current insanity @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 13. Q & A Gabe Schuyler @gabe_sky @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler