In this episode, we are speaking with cybersecurity and technology influencer Chuck Brooks about emerging technologies that can help you defend your organization in cyberspace. Brooks covers everything from the future of quantum computing and the encryption debate to China in tech, election cybersecurity, 5G concerns, and low-hanging cybersecurity fruit companies should address now. Also, new research on device and supply chain security in healthcare from Trend Micro, our premiere podcast partner. RESOURCE LINKS: • Trend Micro research, "Exposed Devices and Supply Chain Attacks: Overlooked Risks in Healthcare Networks" • Chuck Brooks on LinkedIn: • SecureWorld VIRTUAL conferences: • SecureWorld Remote Sessions webcast briefings: The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
Chuck Brooks is Vice President of Government Relations & Marketing for Sutherland Government Solutions. LinkedIn named Chuck as one of "The Top 5 Tech People to Follow on LinkedIn" out of their 450 million members. Chuck's professional industry affiliations include being the Chairman of CompTIA's New and Emerging Technology Committee, and as a member of The AFCEA Cybersecurity Committee. In government, Chuck has served at The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
Mr. Chuck Brooks – one of the world's most known experts and the cyber security guru, shares his thoughts about Industry 4.0 and cyber threats in an interview with Ludmila Morozova-Buss. As the capabilities and connectivity of cyber devices have grown exponentially, so have the cyber intrusions and threats from malware and hackers requiring restructuring of priorities and missions. According to Chuck Brooks, a successful 4.0 cyber threat consequences strategy requires stepping up assessing situational awareness, information sharing, and especially resilience. Cyber resilience is an area that must be further developed both in processes and technologies because no matter what, breaches will happen. Currently, Ransomware mostly via Phishing activities is the top threat.
Our digital world is under assault, and we need to urgently upgrade our defenses. In the past couple of years, the digital attack surface has vastly expanded from a move to remote work, from more people coming online, and from more interconnectivity of PCs and smart devices around the globe. Simultaneously, criminal enterprises and state actors have taken advantage of the lack of visibility and security administration. They are sharing resources and tactics over Dark Web forums and are growing more sophisticated and capable of using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks. The recent Solar Winds breach that circumvented cyber-defenses of numerous countries and most of the Fortune 500 companies was yet another wake-up call to the overwhelmed cybersecurity ecosystem incessantly being bombarded by phishing, ransomware, spoofing, and Distributed Denial of Service attacks. By 2025, the research firm Cybersecurity Ventures estimates that the cost of cybercrime will amount to $10.5 Trillion from multi-vector breaches.