Cybersecurity Trends for 2023

Sdílet
Vložit
  • čas přidán 13. 06. 2024
  • Start your free trial for IBM Security Verify: ibm.biz/BdPL8t
    Learn more about MFA: ibm.biz/BdPL86
    Jeff Crume looks back on 2022 and forward to 2023 and beyond at the trends in cybersecurity. Ransomware and MFA will continue to play key roles in IT security, but what role will AI, deep fakes, and quantum computing play going forward into the New Year?
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

Komentáře • 158

  • @IBMTechnology
    @IBMTechnology  Před rokem +90

    8:13 Jeff misspoke here. There are 770,000 unfilled cybersecurity jobs in the US.

    • @WarRior-rn4kb
      @WarRior-rn4kb Před rokem

      I'm a cybersecurity manager. you forgot this fact: cybersecurity companies are UNWILLING to train new people. It's not that people are uninterested, companies want hard skills right away. If it was up to me, I'd hire people from breakfix/networking/physec and train to do blueteam, or teachers to do cybersecurity project management. But infosec pros are a proud bunch and we'd rather automate rather than train and automate. There is no one else to blame on this "skills shortage" but us. One more thing, lots of infosec pros want to get the "certs/credentials" first, so they don't get leaped frogged by people coming in.

    • @mja9376
      @mja9376 Před rokem +19

      Why are they unfilled? The industry doesn't have entry level opportunities, only experienced opportunities

    • @TiagoCamboja
      @TiagoCamboja Před rokem +3

      Train and teach me. Tks a lot.

    • @1anre
      @1anre Před rokem +1

      Do they mostly beef CISSP qualified folks though?

    • @sharonfeldss2199
      @sharonfeldss2199 Před rokem +1

      I need a job

  • @maestru3456
    @maestru3456 Před rokem +45

    The problem why jobs are not fullfiled is because HR asks for 50 years of experience !

    • @KyoyaTategamiLEO
      @KyoyaTategamiLEO Před 10 měsíci +7

      And then when they get those 50 years they say they’re too old for the job

    • @lanfeustq
      @lanfeustq Před 9 měsíci +3

      The problem is HR ITSELF

  • @Owlan1
    @Owlan1 Před rokem +83

    Best part of this video is Jeff's ability to write so well backwards.

    • @jeffcrume
      @jeffcrume Před rokem +70

      I wish I could but the truth is that we flip the video in the post production process. Now you know the secret to the magic :-)

    • @JamesOKeefe-US
      @JamesOKeefe-US Před rokem +2

      I always wondered how that worked :)

    • @stephaneenglish4661
      @stephaneenglish4661 Před 8 měsíci

      @@jeffcrumewhat!? You mean you’re not left-handed and don’t wear your watch on you right wrist!?
      By the way, I’m looking for resources presenting on cybersecurity specifically tuned for OT/IACS (accounting for AIC prioritisation, rather than CIA), and particularly for energy and water utilities. Does IBM do anything on that topic, or can you give any recommendations?

  • @robrichards1588
    @robrichards1588 Před 6 měsíci +4

    I loved this. I recently got into tech but have been studying. Cyber security is where i want to go and it's so important. People's lives get literally destroyed by these hackers. It's so complex though

  • @shubhmishra66
    @shubhmishra66 Před rokem +2

    Great trend analysis video Jeff!

  • @jatko2009
    @jatko2009 Před rokem +2

    Thank you! This is quite helpful!

  • @surenderarora1899
    @surenderarora1899 Před rokem +3

    Excellent video. Can't wait to see more sessions.

  • @NK-iw6rq
    @NK-iw6rq Před rokem +1

    Great video ! I love IBM !!!

  • @SnipesRuntheNavy
    @SnipesRuntheNavy Před rokem +1

    thanks for this breakdown!

  • @ikechukwumarvellouschibuzofcia
    @ikechukwumarvellouschibuzofcia Před 7 měsíci +2

    What a great awareness Project. Congratulations to the team

  • @mytechnotalent
    @mytechnotalent Před rokem +30

    I completely agree with this analysis. IoT is very vuln as most of the TCP stack on these devices are very primitive.

  • @John-oz1do
    @John-oz1do Před rokem +1

    Very informative. Thanks

  • @purplelookplay2364
    @purplelookplay2364 Před rokem +2

    Great job !❤

  • @manuelapetsi
    @manuelapetsi Před rokem +6

    IBM :) The future is cybersecurity

  • @anilbangera1
    @anilbangera1 Před rokem +1

    Great information 👍

  • @jianlux4661
    @jianlux4661 Před rokem +3

    We need more cybersecurity specialist in the future, i agree. At this point i might suggest to putting the IBM cybersecurty course on coursera free for all, without limit time. This would increase the awareness of all people

  • @mathiasmokube598
    @mathiasmokube598 Před rokem +3

    On point. IOT and AI ...

  • @agustinperes6904
    @agustinperes6904 Před rokem +1

    How much of a threat is security copilot and other forms of automation in the security process for any of these roles?

  • @toanha6997
    @toanha6997 Před rokem +1

    helpful for me, also like your lightboard :)

  • @EmperorShang
    @EmperorShang Před rokem +2

    New year, same problems. So amazing

  • @inspector3654
    @inspector3654 Před rokem +1

    Well thought thank you!

  • @naveedconnect
    @naveedconnect Před rokem +1

    Great presentation..have been an IBMer for 14 years . 😊..now cissp cism iso ccsk qualys qradar oscp (a) and crisc (a) but i would like to return to ibm to work in that great company

  • @BenTruong
    @BenTruong Před rokem +1

    Very interesting!

  • @AlfredoTigolo
    @AlfredoTigolo Před rokem +1

    Thank you for sharing

  • @messizhao3813
    @messizhao3813 Před rokem +13

    quantum-safe, a new word for me, sounds amazing!

    • @laviefu0630
      @laviefu0630 Před rokem

      Quantum-safe algorithms for cryptography

  • @RosaNguyen-ng1og
    @RosaNguyen-ng1og Před rokem +1

    Hi @Jeff or IBM, is the any chance to work as a cyber security with no experience whatsoever in IT ,but only with some basic cert like security +, net+, ? Just wondering before I start digging in ? Thanks

  • @maestru3456
    @maestru3456 Před rokem +4

    I loved the part you said we can't mint as many Cyber security engineers haha

  • @Sara-wb2bs
    @Sara-wb2bs Před rokem +3

    Omg, people don't understand how important all of this information is! We live in a world where whoever has the passcodes, source codes, hacking abilities etc. is very very dangerous. They can shut down whatever they want. Trust me I've experienced this with Russians. I'm so happy IBM is trying to solve these issues.

  • @JohnDoe-dk8zz
    @JohnDoe-dk8zz Před 7 měsíci

    Thanks for this video.

  • @alfonso8667
    @alfonso8667 Před rokem +1

    thank you sir

  • @msaadmalik3493
    @msaadmalik3493 Před rokem +11

    Is "low code vs no code from security perspective" a good area of research in Cybersecurity at Masters level. If not, can you please suggest some good areas.
    Thank you for the very insightful video!

    • @1anre
      @1anre Před rokem +2

      Just go ahead with this thesis topic and let’s know on 2yrs how your degree went

  • @eliaszeray7981
    @eliaszeray7981 Před 3 měsíci

    Great ! Thank u.

  • @monoergon
    @monoergon Před 9 měsíci +1

    Are hardware-encrypted NVME M.2 SSDs efficient against ransomware and other types of attacks?

  • @ArturoGonzalez-uz1by
    @ArturoGonzalez-uz1by Před rokem +46

    770 million un filled cybersecurity jobs requiring CISSP

    • @yawoseitutu9487
      @yawoseitutu9487 Před rokem

      Is CISSP better than CISA?

    • @phabeondominguez5971
      @phabeondominguez5971 Před rokem +1

      @@yawoseitutu9487 is eJPT better then OSCP?

    • @jeffcrume
      @jeffcrume Před rokem +3

      Should have been THOUSAND not million but it’s a huge number either way

    • @jeffcrume
      @jeffcrume Před rokem +3

      @@yawoseitutu9487 it depends on where you want to go in your career. CISSP is generally more focused on the technology for practitioners with CISA for auditors

    • @SagRising19
      @SagRising19 Před rokem +3

      770 million?! 🤔

  • @pit1513
    @pit1513 Před rokem +1

    There needs to be a revamp of what entry level requirements look like. Cause entry level is being pushed as 3 or more years experience. 😩

  • @drsohail9347
    @drsohail9347 Před rokem +1

    Great - Which Tool/software you use for the presentation?

  • @emilywright9573
    @emilywright9573 Před rokem +2

    Hi there @IBM Technology - I would like to use this video for my online lesson - it would be published on our university website as an introduction to a lesson on cyber-security. I will not change any content and credit you as the maker of the video. Would this be alright? Do you give me permission to do this?

  • @Goodwin454
    @Goodwin454 Před rokem +1

    I heard Quantum , the electron truns in both sides at the same time came to my mind .

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      yes, it’s referred to as a superposition of states

  • @ayodejifewa8292
    @ayodejifewa8292 Před rokem +9

    Hahaha I like this. "With current technology we can make a new Human in about 9 Months."

  • @anetsalomo
    @anetsalomo Před 10 měsíci +1

    Is there a chance to tell us how it works with the board? what pen and what light u use? :)

    • @IBMTechnology
      @IBMTechnology  Před 10 měsíci

      You can see how it's done here: czcams.com/video/Uoz_osFtw68/video.html

  • @MalamIbnMalam
    @MalamIbnMalam Před rokem

    Does IBM have an ethical hacker program with labs?

  • @destined-achieversconsult7697

    Please sire, I want to learn Cyber Security, how can I get started?
    I need a full program for it.

  • @monkeydzay9207
    @monkeydzay9207 Před 9 měsíci +1

    Bro if someone turns my fridge off its on sight i stfg! lol

  • @infinite_flesh
    @infinite_flesh Před rokem +2

    Organizations must stop asking for certificates or diplomas when hackers apply for jobs ..

  • @nikthegreek640
    @nikthegreek640 Před rokem

    I recently had a Breach it lasted 5 months problem is the Events that Followed

  • @jerry00034
    @jerry00034 Před 10 měsíci +1

    Maybe there wouldn't be such a problem finding cybersecurity professionals if more companies invested in creating them. I find it annoying to keep hearing companies complain about all these openings yet these same companies are making the bar unreasonably high. You're telling me I have to have PhD level knowledge/experience to use splunk or wireshark? Give me a break.

  • @myname-mz3lo
    @myname-mz3lo Před rokem +3

    when ai starts being used for reverse engineering a whole new attack vector is going to be formed

  • @user-kh3yz4lk5s
    @user-kh3yz4lk5s Před 3 měsíci

    The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill

  • @AHMADKELIX
    @AHMADKELIX Před rokem +1

    permission to learn sir

  • @securitytime
    @securitytime Před rokem

    Hello friends Is anyone can tell me how to become a cyber security specialist without university degree I mean which certifications step by step thanks.

    • @1anre
      @1anre Před rokem

      Watch David Bombal videos and drink a chilled coke when you study

    • @chestonbrownlee1493
      @chestonbrownlee1493 Před rokem +1

      I've been recommended CompTIA A+, Net+, & Sec+ - about to finish so we shall see what opportunities come.

  • @velo1337
    @velo1337 Před rokem +3

    is it so hard to get an OS ransomware safe?

    • @Servantofthearts
      @Servantofthearts Před rokem +1

      What is that

    • @sagarmishra7045
      @sagarmishra7045 Před rokem

      There is way apart from using AV.

    • @jazzjohnson5260
      @jazzjohnson5260 Před rokem

      Yes & No, mainly depending of the use case of the machine. Sure it would be much more difficult for ransomware to appear on a air gapped system, however that may not suite the systems purpose. Generally speaking, large companies are seen as high value targets being attracting skilled individuals, meaning that it is a constant battle between cybersecurity experts & hackers. New vulnerabilities in systems are always being discovered, exploited, and patched.

    • @SumanRoy.official
      @SumanRoy.official Před rokem +3

      Yea, just don't click on hot_chicks.exe

    • @jeffcrume
      @jeffcrume Před rokem +1

      It's very hard because new vulnerabilities are being found every day. OS's are complex and complexity is the enemy of security

  • @1anre
    @1anre Před rokem

    What if more people are made to move to Linux, will this help?

    • @jeffcrume
      @jeffcrume Před rokem +3

      Not necessarily. Linux has some great security features but if they aren't configured properly it can be just as insecure as any other platform. Any operational computer can be broken into and no OS is perfect

  • @luisloboff4839
    @luisloboff4839 Před rokem +2

    Security this….security that…. What about him perfectly writing mirrored

    • @IBMTechnology
      @IBMTechnology  Před rokem

      Search on "lightboard videos" and see how it's done

    • @luisloboff4839
      @luisloboff4839 Před rokem

      @@IBMTechnology Aw never mind… I thought he had magical writing powers

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      I wish I had such powers but here’s how I do it: czcams.com/video/LdnJoT5IWPM/video.html

  • @GregKeane
    @GregKeane Před rokem +1

    how is it possible to have a quantum safe algorithm?

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      The math is beyond me but the US NIST has selected 4 algorithms as finalists that seem to be holding up well to scrutiny (3 of the 4 are IBM contributions, BTW)

  • @mdbshah9042
    @mdbshah9042 Před rokem +4

    It is said that Mfa solves problems that we had 15 years ago…

    • @jeffcrume
      @jeffcrume Před rokem

      … and, unfortunately, still have today

  • @myname-mz3lo
    @myname-mz3lo Před rokem +2

    id love to see mfa that doesnt gatekeep the internet to only people that can afford phones or an mfa device . when will a homeless person be able to go to an internet cafe and log in to google without needing to have a phone or other device that they need to log in ... this gatekeeping is verry dystopian

    • @TubinHard00
      @TubinHard00 Před rokem +1

      Seems like the cafe would need an in house MFA or public device to receive. Or the homeless can get a gvt phone and receive a txt call or use an app. There are ways...

  • @jdev_fr
    @jdev_fr Před rokem

    How is ransomware the "Cause" of data breach?

    • @jeffcrume
      @jeffcrume Před rokem +2

      The attacker can choose to just encrypt data or also make a copy which they could then expose to the world

  • @calt03
    @calt03 Před rokem +5

    They flip the screen in post production

  • @TriPham-yo7we
    @TriPham-yo7we Před 8 dny

    Inventory in software and manual rarely match and transportation can break long range planing or deployment unless strategic cooperation of local and remote access road and communication.. Rummors and misinformation and mean or production are critical. Like venezula situation when bread cost thousand of dollars or noodle cost hundred of dollars so production or lazy holding money from your troops will kill your workers then ourself and soon only worker win it all

  • @pbrigham
    @pbrigham Před rokem +1

    Sorry, the core of data breaches ( 90% of them ) is user mistake or awareness and windows OSs, thats it. And because NONE of this will go away any time son or ever, they will continue to exist or even increase.

  • @myname-mz3lo
    @myname-mz3lo Před rokem +1

    pretty soon they are gonna create an ai that can find zero day vulnerabilities

  • @karuppasamypandiyan4993
    @karuppasamypandiyan4993 Před rokem +3

    General question. Why companies are not ready to recruit freshers for cyber security field?

    • @1anre
      @1anre Před rokem

      You have to send them a post mail

  • @SumanRoy.official
    @SumanRoy.official Před rokem +4

    What technology creates a human in 9 months? 😭😂

    • @jeffcrume
      @jeffcrume Před rokem +3

      That would have to be a subject for a different video … on a different CZcams channel … 😂

  • @lobosmeh6521
    @lobosmeh6521 Před rokem

    770 Mil unfilled Cybersec Jobs in the US...suspicious claim...so we are missing like what 40Bln globally? :) Other than that, great vid

    • @IBMTechnology
      @IBMTechnology  Před rokem

      Thanks, that was indeed a misstatement (as noted in the sticky comment posted earlier).

  • @fightswithspirits915
    @fightswithspirits915 Před 10 měsíci

    Wasn't hacked. No idea why.

  • @blade_monstababy9945
    @blade_monstababy9945 Před rokem +1

    Did he say 770 million?

    • @jeffcrume
      @jeffcrume Před 7 měsíci

      Yeah, I meant 770 thousand. Sorry

  • @dhanushkohlinagaraj5176
    @dhanushkohlinagaraj5176 Před rokem +1

    770 million!!??🤔🤔...

    • @ianbamsey3849
      @ianbamsey3849 Před rokem

      yep, 2 jobs for every person in the US

    • @jeffcrume
      @jeffcrume Před rokem +1

      Yeah, I meant to say 770K not 770M 😂 The video should now have a corrected number flash up on the screen

  • @jarleabelhaugeek1217
    @jarleabelhaugeek1217 Před 3 měsíci

    770 million unfilled cyber security jobs in the US alone?

  • @jamesbrean8004
    @jamesbrean8004 Před 7 měsíci

    Like every phone I get gets hacked

  • @ftapiavalentin
    @ftapiavalentin Před rokem +1

    AI for exploits. 😢

    • @jeffcrume
      @jeffcrume Před rokem +1

      Unfortunately, the sword cuts both ways…

  • @patrickparson9628
    @patrickparson9628 Před rokem +1

    There's no skills gap. I have a cyber security BS and 3 years experience in the field and I haven't found a job in cybersecurity 2 of the last 5 years.

    • @1anre
      @1anre Před rokem +1

      Where are you looking?

  • @gunnareddy7710
    @gunnareddy7710 Před rokem +1

    boss it's not 770 million, it's less than 1 million

    • @jeffcrume
      @jeffcrume Před rokem

      Right. A slip of the tongue. I meant to say 770 thousand. There's a disclaimer now in the video to correct

  • @osnovyanenko
    @osnovyanenko Před rokem

    Wait, how is he writing in reverse?

    • @IBMTechnology
      @IBMTechnology  Před rokem +1

      Search on "lightboard videos".

    • @jeffcrume
      @jeffcrume Před 11 měsíci

      czcams.com/video/LdnJoT5IWPM/video.html

  • @billyboy9356
    @billyboy9356 Před rokem +2

    how da hell does he write backwards

    • @jeffcrume
      @jeffcrume Před rokem +5

      LOL. I can’t. We flip the video in post production. Now the magician has revealed his secret … 🪄

    • @billyboy9356
      @billyboy9356 Před rokem

      @@jeffcrume thanks, now i can sleep in peace again😆

  • @toonnaobi-okoye2949
    @toonnaobi-okoye2949 Před rokem

    Are you writing in reverse?!

    • @jeffcrume
      @jeffcrume Před rokem +3

      I wish I had that skill, but no. I’m also not left-handed. We flip the video after it is recorded in the production process

    • @ozobi2961
      @ozobi2961 Před rokem +1

      @@jeffcrumeyou gave great presentation. Clear information and easy to follow.

    • @jeffcrume
      @jeffcrume Před rokem

      @@ozobi2961 thanks so much!

    • @1anre
      @1anre Před rokem

      @@jeffcrume thanks for not running us mad and helping us understand the magical IBM Lightboard magic.

  • @Tooi-1grote-rotzooi
    @Tooi-1grote-rotzooi Před rokem

    This is the dajjal system

  • @ubee8025
    @ubee8025 Před rokem

    wata majestic nose...

  • @CandyLemon36
    @CandyLemon36 Před 6 měsíci

    The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill