1
CYBERSECURITY 2020
www.paladion.net
Your Biggest Threats
and How You Can Prevent Them
2
Enterprise Security for 2020
Key Cyber Strategies
to deploy in 2020
Advanced Cloud
Security
AI-Driven Vulnerability
Management &
Response
AI-Driven MDR
Key threats to tackle:
DevOps Attacks
Cloud Infrastructure Attacks
Conventional Attacks
Emerging Threats
SaaS Attacks
3
Key Threats
2020
4
Conventional Attacks
2020 Prediction Conventional attacks will still make up the bulk of all threats
Conventional Attacks Still In Play
▪ Phishing, Malware, Ransomware remain effective
▪ New tech opening new attack channels
▪ Most detection tools outdated
78%
of 2019 cyber-espionage
were phishing attacks
$10b
in 2019 damages
from ransomware.
Conventional Attacks are Evolving
▪ More sophisticated variants emerging
▪ Unconventional targets being selected
▪ Attacks-as-a-Service increasing
5
Cloud Infrastructure Attacks
2020 Prediction Most orgs will suffer a Cloud-based compromise this year.
Criminals are Targeting Cloud Vulnerabilities
▪ Cloud data remains a valuable target
▪ Online data privacy fines are increasing
▪ Orgs have an exploitable Cloud “learning
curve”
Orgs are Approaching Cloud Security Wrong
▪ On-prem security not effective for Cloud
▪ Cloud and on - prem have different structures
▪ New security approach needed for Cloud
43%
of orgs had Cloud
security incidents in
2019
Only 27%
of orgs use Cloud data
protection
6
DevOps Attacks
2020 Prediction DevOps will become an increasingly common target.
DevOps: Multiple Attacks in 2019
▪ DevOps emerged as a target
▪ April 2019 - Docker Attack
▪ September - 2019 Avast Attack
DevOps Attacks Offer Leverage
▪ DevOps increasingly vulnerable
▪ Criminals leave backdoors in software
▪ One attack can impact millions
66%
of DevOps and security
teams have negative-to-
neutral relationship.
190,000
accounts compromised
via a single hacked
Docker Hub db.
7
SaaS Attacks
2020 Prediction We will see our first major breach of a SaaS company.
SaaS Platforms: High-Profile Targets
▪ Store mass amounts of valuable data
▪ Require perfect uptime and reliability
▪ Visible, competitive market
Multiple SaaS Attack Vectors
▪ Highly-vulnerable to DDoS attacks
▪ Valuable targets for ransomware
▪ Opportunities for credential stuffing
87%
increase in org spending
on SaaS licenses.
36%
of phishing attacks
target SaaS or webmail
services.
8
Emerging Threats
2020 Prediction
The most cutting-edge orgs will be at the biggest risk from
emerging threats.
New Technology Always Means New Threats
▪ Orgs are adopting new, vulnerable tech
▪ Criminals are leveraging new capabilities
▪ The security landscape is changing faster
than ever
Most Dangerous Emerging Threats Include
▪ Deepfakes
▪ IoT Attacks
▪ Supply Chain Attacks
$3B
IoT security spend will
cross $3billion by 2021
38-43%
of orgs suffered a
supplier security event in
2019
9
Key strategies
2020
10
The average organization requires over 100 days to find
and remediate a threat that has already breached their
systems
MDR offers a comprehensive solution to combat current
threats before it can cause catastrophic damages
2020 will see MDR become a necessity for every effective
cyber defense plan
Fully managed multi-mode threat detection, auto
containment, and incident response from a recognized
MDR provider
of organizations will be using MDR services, up
from less than 5% today. By 2024, 40% of
midsize enterprises will use MDR as their only
managed security service.”
“ By 2024,
25%
- Gartner. MDR Services Market Guide, 2020
Strategy 1:
AI-Driven MDR
11
Strategy 2:
Advanced
Cloud Security
Monitoring security events, configuration changes, and
remediation are key tenets of cloud security
Keeping pace with sophisticated cloud breaches requires
AI-driven use cases
Multi cloud security monitoring will emerge as a key
requirement
Cloud security requires visibility across the cloud stack:
Compute, Storage, Containers, and Serverless
The Cloud security market is projected to expand to $460 million
by the end of 2020.
12
Strategy 3:
AI-Driven
Vulnerability
Management &
Response
AI-Driven Vulnerability Management and Response (VMR)
goes beyond traditional VM programs to offer advanced
triaging and swift remediation.
AI-Driven VMR fills a crucial gap in current VM programs by
focusing on auto remediation of vulnerabilities and exploits
seen in the wild.
In 2020, organizations will utilize Artificial Intelligence
driven VM programs that also provide remediation
With AI-Driven VMR, organizations will fortify on-prem and
next-generation systems, and be much more resilient to
cyber attacks
According to Ponemon, 39% of orgs realize that the breaches
they suffered were due to known, preventable vulnerabilities.
13
Contact us today
to combat tomorrow’s
sophisticated cyber
threats
Visit www.paladion.net
Email sales@paladion.net
14
Thank You

More Related Content

PPTX
Cybersecurity 2020 the biggest threats to watch out for
PDF
Strategies to combat new, innovative cyber threats in 2019
PPTX
The Top Three 2021 Cyber Threats
PPTX
Cyber security
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
Threat Intelligence Market
PDF
Scalar security study2017_slideshare_rev[1]
Cybersecurity 2020 the biggest threats to watch out for
Strategies to combat new, innovative cyber threats in 2019
The Top Three 2021 Cyber Threats
Cyber security
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Cyber Risk Management in 2017: Challenges & Recommendations
Threat Intelligence Market
Scalar security study2017_slideshare_rev[1]

What's hot (20)

PPTX
Security Trend Report, 2017
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PPTX
Enterprise Cyber Security 2016
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PDF
Cyber security investments 2021
PDF
Must Know Cyber Security Stats of 2016
PDF
The State of Cyber
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PPTX
The State Of Information and Cyber Security in 2016
PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
Trend Micro Solutions Overview
PDF
Building Cyber Resilience in the Digital Economy
PDF
Trend Micro 10 Minute Overview
PPT
The Security Director's Practical Guide to Cyber Security
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
A New Year’s Ransomware Resolution
PDF
Networkers cyber security market intelligence report
PPTX
Summer internship - Cybersecurity
PDF
From Cybersecurity to Cyber Resilience
Security Trend Report, 2017
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Enterprise Cyber Security 2016
Cyber Risk Management in 2017 - Challenges & Recommendations
Digital Transformation and Security for the Modern Business Part 1 – Finance
Cyber security investments 2021
Must Know Cyber Security Stats of 2016
The State of Cyber
Cybersecurity 2020 threat landscape and its implications (AMER)
The State Of Information and Cyber Security in 2016
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Trend Micro Solutions Overview
Building Cyber Resilience in the Digital Economy
Trend Micro 10 Minute Overview
The Security Director's Practical Guide to Cyber Security
Future of Cybersecurity 2016 - M.Rosenquist
A New Year’s Ransomware Resolution
Networkers cyber security market intelligence report
Summer internship - Cybersecurity
From Cybersecurity to Cyber Resilience
Ad

Similar to Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them (20)

PDF
Cybersecurity Predictions For 2022.pdf
PDF
GramaxCybersec_Cybersecurity Trends 2024.pdf
PDF
White Paper Example - Brafton for NIP Group.pdf
PPTX
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
PPTX
Top cybersecurity trends to adapt in 2022
PDF
Cybersecurity in the Cloud: Safer Than You Think
PDF
Cybersecurity Made Simple: How to Protect Your Business in 2025
PDF
CYBER-THREAT-LANDSCAPE-2021.pdf
PDF
Emerging Cybersecurity Trends.pdf
PDF
True Cost of Ransomware to Your Business
PDF
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
PDF
Cybersecurity Improvement eBook
PDF
2024 Cybersecurity Trends- Stay Ahead Now
PPTX
The Importance of Cybersecurity in 2017
PDF
The 5 most trusted cyber security companies to watch.
PDF
PPTX
The Five Biggest Cyber Security Trends In 2022
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PDF
2024-Cybersecurity-Outlook for all engineering students
Cybersecurity Predictions For 2022.pdf
GramaxCybersec_Cybersecurity Trends 2024.pdf
White Paper Example - Brafton for NIP Group.pdf
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Top cybersecurity trends to adapt in 2022
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity Made Simple: How to Protect Your Business in 2025
CYBER-THREAT-LANDSCAPE-2021.pdf
Emerging Cybersecurity Trends.pdf
True Cost of Ransomware to Your Business
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Cybersecurity Improvement eBook
2024 Cybersecurity Trends- Stay Ahead Now
The Importance of Cybersecurity in 2017
The 5 most trusted cyber security companies to watch.
The Five Biggest Cyber Security Trends In 2022
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
2024-Cybersecurity-Outlook for all engineering students
Ad

Recently uploaded (20)

PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Five Habits of High-Impact Board Members
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A proposed approach for plagiarism detection in Myanmar Unicode text
Developing a website for English-speaking practice to English as a foreign la...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Final SEM Unit 1 for mit wpu at pune .pptx
UiPath Agentic Automation session 1: RPA to Agents
A review of recent deep learning applications in wood surface defect identifi...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Build Your First AI Agent with UiPath.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Custom Battery Pack Design Considerations for Performance and Safety
Five Habits of High-Impact Board Members
sbt 2.0: go big (Scala Days 2025 edition)
Convolutional neural network based encoder-decoder for efficient real-time ob...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Module 1.ppt Iot fundamentals and Architecture
TEXTILE technology diploma scope and career opportunities
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx

Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them

  • 1. 1 CYBERSECURITY 2020 www.paladion.net Your Biggest Threats and How You Can Prevent Them
  • 2. 2 Enterprise Security for 2020 Key Cyber Strategies to deploy in 2020 Advanced Cloud Security AI-Driven Vulnerability Management & Response AI-Driven MDR Key threats to tackle: DevOps Attacks Cloud Infrastructure Attacks Conventional Attacks Emerging Threats SaaS Attacks
  • 4. 4 Conventional Attacks 2020 Prediction Conventional attacks will still make up the bulk of all threats Conventional Attacks Still In Play ▪ Phishing, Malware, Ransomware remain effective ▪ New tech opening new attack channels ▪ Most detection tools outdated 78% of 2019 cyber-espionage were phishing attacks $10b in 2019 damages from ransomware. Conventional Attacks are Evolving ▪ More sophisticated variants emerging ▪ Unconventional targets being selected ▪ Attacks-as-a-Service increasing
  • 5. 5 Cloud Infrastructure Attacks 2020 Prediction Most orgs will suffer a Cloud-based compromise this year. Criminals are Targeting Cloud Vulnerabilities ▪ Cloud data remains a valuable target ▪ Online data privacy fines are increasing ▪ Orgs have an exploitable Cloud “learning curve” Orgs are Approaching Cloud Security Wrong ▪ On-prem security not effective for Cloud ▪ Cloud and on - prem have different structures ▪ New security approach needed for Cloud 43% of orgs had Cloud security incidents in 2019 Only 27% of orgs use Cloud data protection
  • 6. 6 DevOps Attacks 2020 Prediction DevOps will become an increasingly common target. DevOps: Multiple Attacks in 2019 ▪ DevOps emerged as a target ▪ April 2019 - Docker Attack ▪ September - 2019 Avast Attack DevOps Attacks Offer Leverage ▪ DevOps increasingly vulnerable ▪ Criminals leave backdoors in software ▪ One attack can impact millions 66% of DevOps and security teams have negative-to- neutral relationship. 190,000 accounts compromised via a single hacked Docker Hub db.
  • 7. 7 SaaS Attacks 2020 Prediction We will see our first major breach of a SaaS company. SaaS Platforms: High-Profile Targets ▪ Store mass amounts of valuable data ▪ Require perfect uptime and reliability ▪ Visible, competitive market Multiple SaaS Attack Vectors ▪ Highly-vulnerable to DDoS attacks ▪ Valuable targets for ransomware ▪ Opportunities for credential stuffing 87% increase in org spending on SaaS licenses. 36% of phishing attacks target SaaS or webmail services.
  • 8. 8 Emerging Threats 2020 Prediction The most cutting-edge orgs will be at the biggest risk from emerging threats. New Technology Always Means New Threats ▪ Orgs are adopting new, vulnerable tech ▪ Criminals are leveraging new capabilities ▪ The security landscape is changing faster than ever Most Dangerous Emerging Threats Include ▪ Deepfakes ▪ IoT Attacks ▪ Supply Chain Attacks $3B IoT security spend will cross $3billion by 2021 38-43% of orgs suffered a supplier security event in 2019
  • 10. 10 The average organization requires over 100 days to find and remediate a threat that has already breached their systems MDR offers a comprehensive solution to combat current threats before it can cause catastrophic damages 2020 will see MDR become a necessity for every effective cyber defense plan Fully managed multi-mode threat detection, auto containment, and incident response from a recognized MDR provider of organizations will be using MDR services, up from less than 5% today. By 2024, 40% of midsize enterprises will use MDR as their only managed security service.” “ By 2024, 25% - Gartner. MDR Services Market Guide, 2020 Strategy 1: AI-Driven MDR
  • 11. 11 Strategy 2: Advanced Cloud Security Monitoring security events, configuration changes, and remediation are key tenets of cloud security Keeping pace with sophisticated cloud breaches requires AI-driven use cases Multi cloud security monitoring will emerge as a key requirement Cloud security requires visibility across the cloud stack: Compute, Storage, Containers, and Serverless The Cloud security market is projected to expand to $460 million by the end of 2020.
  • 12. 12 Strategy 3: AI-Driven Vulnerability Management & Response AI-Driven Vulnerability Management and Response (VMR) goes beyond traditional VM programs to offer advanced triaging and swift remediation. AI-Driven VMR fills a crucial gap in current VM programs by focusing on auto remediation of vulnerabilities and exploits seen in the wild. In 2020, organizations will utilize Artificial Intelligence driven VM programs that also provide remediation With AI-Driven VMR, organizations will fortify on-prem and next-generation systems, and be much more resilient to cyber attacks According to Ponemon, 39% of orgs realize that the breaches they suffered were due to known, preventable vulnerabilities.
  • 13. 13 Contact us today to combat tomorrow’s sophisticated cyber threats Visit www.paladion.net Email [email protected]