Тёмный

Cybersecurity Trends for 2023 

IBM Technology
Подписаться 860 тыс.
Просмотров 241 тыс.
50% 1

Опубликовано:

 

25 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 159   
@IBMTechnology
@IBMTechnology Год назад
8:13 Jeff misspoke here. There are 770,000 unfilled cybersecurity jobs in the US.
@WarRior-rn4kb
@WarRior-rn4kb Год назад
I'm a cybersecurity manager. you forgot this fact: cybersecurity companies are UNWILLING to train new people. It's not that people are uninterested, companies want hard skills right away. If it was up to me, I'd hire people from breakfix/networking/physec and train to do blueteam, or teachers to do cybersecurity project management. But infosec pros are a proud bunch and we'd rather automate rather than train and automate. There is no one else to blame on this "skills shortage" but us. One more thing, lots of infosec pros want to get the "certs/credentials" first, so they don't get leaped frogged by people coming in.
@mja9376
@mja9376 Год назад
Why are they unfilled? The industry doesn't have entry level opportunities, only experienced opportunities
@TiagoCamboja
@TiagoCamboja Год назад
Train and teach me. Tks a lot.
@1anre
@1anre Год назад
Do they mostly beef CISSP qualified folks though?
@sharonfeldss2199
@sharonfeldss2199 Год назад
I need a job
@Owlan1
@Owlan1 Год назад
Best part of this video is Jeff's ability to write so well backwards.
@jeffcrume
@jeffcrume Год назад
I wish I could but the truth is that we flip the video in the post production process. Now you know the secret to the magic :-)
@JamesOKeefe-US
@JamesOKeefe-US Год назад
I always wondered how that worked :)
@stephaneenglish4661
@stephaneenglish4661 Год назад
@@jeffcrumewhat!? You mean you’re not left-handed and don’t wear your watch on you right wrist!? By the way, I’m looking for resources presenting on cybersecurity specifically tuned for OT/IACS (accounting for AIC prioritisation, rather than CIA), and particularly for energy and water utilities. Does IBM do anything on that topic, or can you give any recommendations?
@Mikeroddy69
@Mikeroddy69 Год назад
The problem why jobs are not fullfiled is because HR asks for 50 years of experience !
@KyoyaTategamiLEO
@KyoyaTategamiLEO Год назад
And then when they get those 50 years they say they’re too old for the job
@lanfeustq
@lanfeustq Год назад
The problem is HR ITSELF
@robrichards1588
@robrichards1588 9 месяцев назад
I loved this. I recently got into tech but have been studying. Cyber security is where i want to go and it's so important. People's lives get literally destroyed by these hackers. It's so complex though
@mytechnotalent
@mytechnotalent Год назад
I completely agree with this analysis. IoT is very vuln as most of the TCP stack on these devices are very primitive.
@jianlux4661
@jianlux4661 Год назад
We need more cybersecurity specialist in the future, i agree. At this point i might suggest to putting the IBM cybersecurty course on coursera free for all, without limit time. This would increase the awareness of all people
@Sara-wb2bs
@Sara-wb2bs Год назад
Omg, people don't understand how important all of this information is! We live in a world where whoever has the passcodes, source codes, hacking abilities etc. is very very dangerous. They can shut down whatever they want. Trust me I've experienced this with Russians. I'm so happy IBM is trying to solve these issues.
@Ucsd4life
@Ucsd4life Год назад
770 million un filled cybersecurity jobs requiring CISSP
@yawoseitutu9487
@yawoseitutu9487 Год назад
Is CISSP better than CISA?
@phabeondominguez5971
@phabeondominguez5971 Год назад
@@yawoseitutu9487 is eJPT better then OSCP?
@jeffcrume
@jeffcrume Год назад
Should have been THOUSAND not million but it’s a huge number either way
@jeffcrume
@jeffcrume Год назад
@@yawoseitutu9487 it depends on where you want to go in your career. CISSP is generally more focused on the technology for practitioners with CISA for auditors
@SagRising19
@SagRising19 Год назад
770 million?! 🤔
@manuelapetsi
@manuelapetsi Год назад
IBM :) The future is cybersecurity
@ikechukwumarvellouschibuzofcia
@ikechukwumarvellouschibuzofcia 10 месяцев назад
What a great awareness Project. Congratulations to the team
@Mikeroddy69
@Mikeroddy69 Год назад
I loved the part you said we can't mint as many Cyber security engineers haha
@messizhao3813
@messizhao3813 Год назад
quantum-safe, a new word for me, sounds amazing!
@laviefu0630
@laviefu0630 Год назад
Quantum-safe algorithms for cryptography
@naveedconnect
@naveedconnect Год назад
Great presentation..have been an IBMer for 14 years . 😊..now cissp cism iso ccsk qualys qradar oscp (a) and crisc (a) but i would like to return to ibm to work in that great company
@monoergon
@monoergon Год назад
Are hardware-encrypted NVME M.2 SSDs efficient against ransomware and other types of attacks?
@ayodejifewa8292
@ayodejifewa8292 Год назад
Hahaha I like this. "With current technology we can make a new Human in about 9 Months."
@jeffcrume
@jeffcrume Год назад
😂
@destined-achieversconsult7697
Please sire, I want to learn Cyber Security, how can I get started? I need a full program for it.
@EmperorShang
@EmperorShang Год назад
New year, same problems. So amazing
@technoren117
@technoren117 Год назад
Is "low code vs no code from security perspective" a good area of research in Cybersecurity at Masters level. If not, can you please suggest some good areas. Thank you for the very insightful video!
@1anre
@1anre Год назад
Just go ahead with this thesis topic and let’s know on 2yrs how your degree went
@RosaNguyen-ng1og
@RosaNguyen-ng1og Год назад
Hi @Jeff or IBM, is the any chance to work as a cyber security with no experience whatsoever in IT ,but only with some basic cert like security +, net+, ? Just wondering before I start digging in ? Thanks
@pit1513
@pit1513 Год назад
There needs to be a revamp of what entry level requirements look like. Cause entry level is being pushed as 3 or more years experience. 😩
@agustinperes6904
@agustinperes6904 Год назад
How much of a threat is security copilot and other forms of automation in the security process for any of these roles?
@shubhmishra66
@shubhmishra66 Год назад
Great trend analysis video Jeff!
@jerry00034
@jerry00034 Год назад
Maybe there wouldn't be such a problem finding cybersecurity professionals if more companies invested in creating them. I find it annoying to keep hearing companies complain about all these openings yet these same companies are making the bar unreasonably high. You're telling me I have to have PhD level knowledge/experience to use splunk or wireshark? Give me a break.
@Goodwin454
@Goodwin454 Год назад
I heard Quantum , the electron truns in both sides at the same time came to my mind .
@jeffcrume
@jeffcrume Год назад
yes, it’s referred to as a superposition of states
@mathiasmokube598
@mathiasmokube598 Год назад
On point. IOT and AI ...
@anetsalomo
@anetsalomo Год назад
Is there a chance to tell us how it works with the board? what pen and what light u use? :)
@IBMTechnology
@IBMTechnology Год назад
You can see how it's done here: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-Uoz_osFtw68.html
@AlfredoTigolo
@AlfredoTigolo Год назад
Thank you for sharing
@monkeydzay9207
@monkeydzay9207 Год назад
Bro if someone turns my fridge off its on sight i stfg! lol
@surenderarora1899
@surenderarora1899 Год назад
Excellent video. Can't wait to see more sessions.
@GregKeane
@GregKeane Год назад
how is it possible to have a quantum safe algorithm?
@jeffcrume
@jeffcrume Год назад
The math is beyond me but the US NIST has selected 4 algorithms as finalists that seem to be holding up well to scrutiny (3 of the 4 are IBM contributions, BTW)
@drsohail9347
@drsohail9347 Год назад
Great - Which Tool/software you use for the presentation?
@IBMTechnology
@IBMTechnology Год назад
See ibm.biz/write-backwards
@emilywright9573
@emilywright9573 Год назад
Hi there @IBM Technology - I would like to use this video for my online lesson - it would be published on our university website as an introduction to a lesson on cyber-security. I will not change any content and credit you as the maker of the video. Would this be alright? Do you give me permission to do this?
@toanha6997
@toanha6997 Год назад
helpful for me, also like your lightboard :)
@luisloboff4839
@luisloboff4839 Год назад
Security this….security that…. What about him perfectly writing mirrored
@IBMTechnology
@IBMTechnology Год назад
Search on "lightboard videos" and see how it's done
@luisloboff4839
@luisloboff4839 Год назад
@@IBMTechnology Aw never mind… I thought he had magical writing powers
@jeffcrume
@jeffcrume Год назад
I wish I had such powers but here’s how I do it: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-LdnJoT5IWPM.html
@jatko2009
@jatko2009 Год назад
Thank you! This is quite helpful!
@nsensei2112
@nsensei2112 Год назад
I recently had a Breach it lasted 5 months problem is the Events that Followed
@JohnDoe-dk8zz
@JohnDoe-dk8zz 11 месяцев назад
Thanks for this video.
@SnipesRuntheNavy
@SnipesRuntheNavy Год назад
thanks for this breakdown!
@MalamIbnMalam
@MalamIbnMalam Год назад
Does IBM have an ethical hacker program with labs?
@velo1337
@velo1337 Год назад
is it so hard to get an OS ransomware safe?
@Servantofthearts
@Servantofthearts Год назад
What is that
@sagarmishra7045
@sagarmishra7045 Год назад
There is way apart from using AV.
@jazzjohnson5260
@jazzjohnson5260 Год назад
Yes & No, mainly depending of the use case of the machine. Sure it would be much more difficult for ransomware to appear on a air gapped system, however that may not suite the systems purpose. Generally speaking, large companies are seen as high value targets being attracting skilled individuals, meaning that it is a constant battle between cybersecurity experts & hackers. New vulnerabilities in systems are always being discovered, exploited, and patched.
@SumanRoy.official
@SumanRoy.official Год назад
Yea, just don't click on hot_chicks.exe
@jeffcrume
@jeffcrume Год назад
It's very hard because new vulnerabilities are being found every day. OS's are complex and complexity is the enemy of security
@myname-mz3lo
@myname-mz3lo Год назад
when ai starts being used for reverse engineering a whole new attack vector is going to be formed
@mdbshah9042
@mdbshah9042 Год назад
It is said that Mfa solves problems that we had 15 years ago…
@jeffcrume
@jeffcrume Год назад
… and, unfortunately, still have today
@myname-mz3lo
@myname-mz3lo Год назад
id love to see mfa that doesnt gatekeep the internet to only people that can afford phones or an mfa device . when will a homeless person be able to go to an internet cafe and log in to google without needing to have a phone or other device that they need to log in ... this gatekeeping is verry dystopian
@TubinHard00
@TubinHard00 Год назад
Seems like the cafe would need an in house MFA or public device to receive. Or the homeless can get a gvt phone and receive a txt call or use an app. There are ways...
@John-oz1do
@John-oz1do Год назад
Very informative. Thanks
@DanaCarroll-z6y
@DanaCarroll-z6y 7 месяцев назад
The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill
@karuppasamypandiyan4993
@karuppasamypandiyan4993 Год назад
General question. Why companies are not ready to recruit freshers for cyber security field?
@1anre
@1anre Год назад
You have to send them a post mail
@calt03
@calt03 Год назад
They flip the screen in post production
@NK-iw6rq
@NK-iw6rq Год назад
Great video ! I love IBM !!!
@inspector3654
@inspector3654 Год назад
Well thought thank you!
@BenTruong
@BenTruong Год назад
Very interesting!
@eliaszeray7981
@eliaszeray7981 6 месяцев назад
Great ! Thank u.
@pbrigham
@pbrigham Год назад
Sorry, the core of data breaches ( 90% of them ) is user mistake or awareness and windows OSs, thats it. And because NONE of this will go away any time son or ever, they will continue to exist or even increase.
@purplelookplay2364
@purplelookplay2364 Год назад
Great job !❤
@jdev_fr
@jdev_fr Год назад
How is ransomware the "Cause" of data breach?
@jeffcrume
@jeffcrume Год назад
The attacker can choose to just encrypt data or also make a copy which they could then expose to the world
@anilbangera1
@anilbangera1 Год назад
Great information 👍
@securitytime
@securitytime Год назад
Hello friends Is anyone can tell me how to become a cyber security specialist without university degree I mean which certifications step by step thanks.
@1anre
@1anre Год назад
Watch David Bombal videos and drink a chilled coke when you study
@chestonbrownlee1493
@chestonbrownlee1493 Год назад
I've been recommended CompTIA A+, Net+, & Sec+ - about to finish so we shall see what opportunities come.
@AHMADKELIX
@AHMADKELIX Год назад
permission to learn sir
@TriPham-yo7we
@TriPham-yo7we 3 месяца назад
Inventory in software and manual rarely match and transportation can break long range planing or deployment unless strategic cooperation of local and remote access road and communication.. Rummors and misinformation and mean or production are critical. Like venezula situation when bread cost thousand of dollars or noodle cost hundred of dollars so production or lazy holding money from your troops will kill your workers then ourself and soon only worker win it all
@1anre
@1anre Год назад
What if more people are made to move to Linux, will this help?
@jeffcrume
@jeffcrume Год назад
Not necessarily. Linux has some great security features but if they aren't configured properly it can be just as insecure as any other platform. Any operational computer can be broken into and no OS is perfect
@alfonso8667
@alfonso8667 Год назад
thank you sir
@fightswithspirits915
@fightswithspirits915 Год назад
Wasn't hacked. No idea why.
@myname-mz3lo
@myname-mz3lo Год назад
pretty soon they are gonna create an ai that can find zero day vulnerabilities
@blade_monstababy9945
@blade_monstababy9945 Год назад
Did he say 770 million?
@jeffcrume
@jeffcrume 11 месяцев назад
Yeah, I meant 770 thousand. Sorry
@SumanRoy.official
@SumanRoy.official Год назад
What technology creates a human in 9 months? 😭😂
@jeffcrume
@jeffcrume Год назад
That would have to be a subject for a different video … on a different RU-vid channel … 😂
@lobosmeh6521
@lobosmeh6521 Год назад
770 Mil unfilled Cybersec Jobs in the US...suspicious claim...so we are missing like what 40Bln globally? :) Other than that, great vid
@IBMTechnology
@IBMTechnology Год назад
Thanks, that was indeed a misstatement (as noted in the sticky comment posted earlier).
@jarleabelhaugeek1217
@jarleabelhaugeek1217 7 месяцев назад
770 million unfilled cyber security jobs in the US alone?
@patrickokafor-yt9oy
@patrickokafor-yt9oy 2 месяца назад
Nice
@dhanushkohlinagaraj5176
@dhanushkohlinagaraj5176 Год назад
770 million!!??🤔🤔...
@ianbamsey3849
@ianbamsey3849 Год назад
yep, 2 jobs for every person in the US
@jeffcrume
@jeffcrume Год назад
Yeah, I meant to say 770K not 770M 😂 The video should now have a corrected number flash up on the screen
@patrickparson9628
@patrickparson9628 Год назад
There's no skills gap. I have a cyber security BS and 3 years experience in the field and I haven't found a job in cybersecurity 2 of the last 5 years.
@1anre
@1anre Год назад
Where are you looking?
@jamesbrean8004
@jamesbrean8004 10 месяцев назад
Like every phone I get gets hacked
@ftapiavalentin
@ftapiavalentin Год назад
AI for exploits. 😢
@jeffcrume
@jeffcrume Год назад
Unfortunately, the sword cuts both ways…
@gunnareddy7710
@gunnareddy7710 Год назад
boss it's not 770 million, it's less than 1 million
@jeffcrume
@jeffcrume Год назад
Right. A slip of the tongue. I meant to say 770 thousand. There's a disclaimer now in the video to correct
@billyboy9356
@billyboy9356 Год назад
how da hell does he write backwards
@jeffcrume
@jeffcrume Год назад
LOL. I can’t. We flip the video in post production. Now the magician has revealed his secret … 🪄
@billyboy9356
@billyboy9356 Год назад
@@jeffcrume thanks, now i can sleep in peace again😆
@osnovyanenko
@osnovyanenko Год назад
Wait, how is he writing in reverse?
@IBMTechnology
@IBMTechnology Год назад
Search on "lightboard videos".
@jeffcrume
@jeffcrume Год назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-LdnJoT5IWPM.html
@toonnaobi-okoye2949
@toonnaobi-okoye2949 Год назад
Are you writing in reverse?!
@jeffcrume
@jeffcrume Год назад
I wish I had that skill, but no. I’m also not left-handed. We flip the video after it is recorded in the production process
@ozobi2961
@ozobi2961 Год назад
@@jeffcrumeyou gave great presentation. Clear information and easy to follow.
@jeffcrume
@jeffcrume Год назад
@@ozobi2961 thanks so much!
@1anre
@1anre Год назад
@@jeffcrume thanks for not running us mad and helping us understand the magical IBM Lightboard magic.
@ubee8025
@ubee8025 Год назад
wata majestic nose...
@Tooi-1grote-rotzooi
@Tooi-1grote-rotzooi Год назад
This is the dajjal system
@infinite_flesh
@infinite_flesh Год назад
Organizations must stop asking for certificates or diplomas when hackers apply for jobs ..
@CandyLemon36
@CandyLemon36 10 месяцев назад
The wisdom here is remarkably compelling. A book with akin insights promoted significant development in me. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill
Далее
2024 Cybersecurity Trends
7:57
Просмотров 176 тыс.
Китайка нашла Новый Дом😂😆
00:20
FIDO Promises a Life Without Passwords
9:58
Просмотров 405 тыс.
The AI Cybersecurity future is here
26:42
Просмотров 158 тыс.
The State of Cybersecurity - Year in Review
21:10
Просмотров 47 тыс.
Why Hacking is the Future of War
31:45
Просмотров 2,8 млн
Cyber Attacks | 60 Minutes Full Episodes
55:59
Просмотров 874 тыс.
Cybersecurity for Beginners: Basic Skills
5:41
Просмотров 340 тыс.
Cyber Attack Trends: Global Identity Crisis
15:02
Просмотров 42 тыс.
Will AI Help or Hurt Cybersecurity? Definitely!
10:01