Professional Documents
Culture Documents
A Visual History of Cybersecurity
A Visual History of Cybersecurity
A Future is
looking Cloud-y
VISUAL
1970 HISTORY 2020
OF
CYBERSECURITY
“Catch me if
you can!”
INTRODUCTION 01 - 02
1970-1979 03 - 10
1980-1989 11 - 20
1990-1999 21 - 30
2000-2009 31 - 46
2010-2019 47 - 74
2020 75 - 84
PREDICTIONS 85 - 98
1 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 2
KEEP ON HACKIN’
K E E P O N H A C K IN ’
100110010
3 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 4
Don’t Fear the Reaper
1970 Soon aer the first virus, codenamed
UofU
“Creeper,” came the first anti-virus,
NEVADA ARPANET, the precursor to
appropriately named “Reaper.”3
UTAH the modern Internet, releases
SRI the Network Control Protocol
CA (NCP) allowing computers at
LI remote locations to transfer
FO files between computers.2
RN “I’m Creeper, the
IA first ever computer
UCSB
ARIZONA 1970 virus! Catch me if
UCLA Funky Fact
The first computer virus is created you can.”
The first four
by Bob Thomas as a non-
computer network
malicious program that moves
nodes in ARPANET
through computers displaying the
were all universities.2
message, "I am the Creeper,
catch me if you can."3
1970
5 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 6
1971 APRIL FOOLS 1976
Steve Jobs and Steve
1975
Wozniak launch the
John Draper legendarily discovers a Apple I personal computer
method to unlock free long distance on April Fool's Day, with a
calls using a 2600 hertz frequency single circut board.3
tone produced by a toy whistle
found in Cap’n Crunch cereal boxes.
Commodore
$1,000 PET $110,105
Kenbak-1 $795 in 2020
PHREAKERS
$800 $750
TRS-80 $4,421
Altair $4,171
$595 in 2020
$565 in 2020
$600 $3,309
$3,142
in 2020
$400 in 2020
UNITE
Sources
$200
1 www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/ ; 2016
2 www.livescience.com/20718-computer-history.html ; 2017
3 www.worldsciencefestival.com/infographics/a_history_of_computer_science/
7 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 8
1976 1979
INSIDER ATTACK
XEROX PALO ALTO
Greg Chung of Boeing commits one of the worst RESEARCH CENTER
cybersecurity breaches in history, sending $2 billion
At the Xerox Palo Alto Research Center,
worth of stolen documents to China.
John Shoch and Jon Hupp create a
small program that searches a network
The binders contained thousands of for computers with idle processor time,
documents, including many design the first worm.
manuals related to U.S. military
aircraft—the B-1 bomber, the C-17
military cargo plane, the F-15 fighter jet,
and the Chinook 47 and 48 helicopters.1
2006
The FBI begins their investigation into Chung’s Worms demonstrated a capacity
possible espionage involvement. for invading any computer on a
network, creating the security
threat that continues with
2010
viruses today.2
9 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 10
PERSON OF
THE YEAR
THE COMPUTER MOVES IN
11 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 12
FUN FACT
The popular video arcade
game "Pac-Man" is released
in 1980. The original Japanese
title of Puck Man was
changed to Pac-Man for
1980
international releases as a
preventative measure
against defacement of the
IBM ignites the
arcade machines by
personal computer
changing the P to an F.
1981
market and
revolutionizes business
computing with
The first video game magazine
widespread industry
in the U.S. is founded and called
adoption. Formerly
Electronic Games. Aer rapid
known as the IBM Model
success during its first two
5150, their first PC used
years, it faltered during the 1983
Microso's MS-DOS
Video Game Crash and ceased
operating system and a
1982
publication in 1985.1
4.77 MHz Intel 8088
microprocessor.1
The U.S. reprograms
computer equipment
that was being purchased
through a front company
There
for a Soviet gas pipeline.
This proto-cyberaack
Commodore's VIC-20 home causes the pipeline
computer becomes a less to explode.2
expensive alternative to their
initial PET PC and is the first
PC to sell more than one
she blows
million units. Star Trek star
William Shatner appeared in
their advertisments.1
Sources
1 www.computerhistory.org/timeline/1980/ ; 2020
2 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cyber-
security.aspx?Page=1http://gcn.com/Articles/2013/05/30/
GCN30-Timeline-Cybersecurity.aspx?Page=1 ; 2013
13 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 14
1984
DOUBLE
DISASTER
1986
The Swiss company The Chernobyl
"Swatch" introduces
nuclear reactor
their watches and
they become a explodes in the USSR.
Apple’s iconic "1984"
fashion craze. The Space Shule
commercial airs on
January 22, 1984 during Markus Hess and his Challenger disaster
Super Bowl XVIII. accomplices are arrested takes place when the
in West Germany for space shule
Apple introduces the
hacking into the Lawrence disintegrates aer
Macintosh.1
Berkeley National being launched,
Laboratory and selling killing all on board.
stolen information to the
KGB, but only receive
suspended sentences.3
1987
President Reagan signs
Microso releases
the Computer Security
Windows-1.2
Act of 1987 to protect
the computer data of
federal agencies.1
Sources
1 www.computerhistory.org/timeline/1984/ ; 2020
2 www.worldsciencefestival.com/infographics/a_history_of_computer_science/
3 www.washingtonpost.com/archive/politics/1989/08/17/computer-hackers-face-spy-charges/
cad42e6b-73db-48d4-814f-86eb1574ae68/ ; 1989
15 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 16
“ [The Morris Worm] woke
the public up to the need
1988
Viruses become
more problematic for cybersecurity. Prior to
the invasion of the worm,
and widespread
following the
Morris worm. The
first dedicated
antivirus company
no attack had affected so
is also founded
many private users and
Rachel
this year.
companies at once.
HI! MY NAME IS
ROBERT MORRIS
Although the inflicted
Robert Morris' self-
propogating computer
damage was an accident,
worm succeeded in
closing down much of Morris was the first person
the internet and led to a
felony conviction. He to ever be convicted
received a sentence of
three years of probation,
400 hours of community
under the 1986 Computer “
service and a $10,050 fine.
Fraud and Abuse Act.2
Sources
Image: www.flickr.com/photos/intelfreepress/10477292993/ ; 2013
1 www.sentinelone.com/blog/history-of-cyber-security/ ;
2 www.captechu.edu/blog/cyber-security-impact-30th-anniversary-of-morris-worm
17 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 18
THE MORRIS WORM
CLOSED DOWN MOST
OF THE INTERNET
WHILE IT WAS ACTIVE...
19 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 20
Search
1 9 90
21 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 22
1993 (we’re still trying to close all of
the pop-up windows)
Marc Andresson creates
the first user-friendly
web browser under the
name Mosaic (later
known as Netscape.)
Error 993
Error 993
1994
1990
A U.S. Air Force research facility discovers a
password "sniffer" was installed onto their network,
compromising over 100 user accounts. The two
hackers responsible were identified as Cowboy and
Kuji, working together under the name Datastream.2
Arpanet starts the operational network known as
the Internet, connecting approximately 2.6 million
people worldwide.1
HTTPS://
Sources
1 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1http://gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity. Netscape develops Secure Sockets Layer
aspx?Page=1 ; 2013
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019 encryption to ensure safer online transactions in
response to internet security concerns.1
23 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 24
1996
1995
The first Microso Word Health Insurance Portability and
virus spreads worldwide via Account Act (HIPAA), becomes law
macro commands. on August 21, 1996.
1996
President Clinton
initiates the President's
Commission on Critical
Infrastructure
Protection.
OPTIV HISTORY
1995
FishNet Security is
founded, one of two
companies which later
Russian soware engineer Vladimir merge to form Optiv.
Levin hacks Citibank's New York IT
system, illegally wiring an
estimated $10 million to accounts
worldwide from his apartment in Sources
Saint Petersburg. Image: Bob McNeely, The White House (Public Domain)
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
2 www.pbs.org/wgbh/pages/frontline/shows/cyberwar/etc/faqs.html ; 2003
25 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 26
MAX HACK
1998
Max Butler is imprisoned for
18 months aer hacking U.S.
government websites in 1998.3
1998
Teenage hackers gain control of
enough for Max Butler.2
hundreds of computer systems used by
the military, government and private
sectors and steal a piece of NASA soware
2003
Once released in 2003, he commits
in an incident known as the "Solar Sunrise."
aacks, programs malware and steals
27 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 28
IT teams rushed applications onto the
web during this time, prioritizing
speed-to-deployment, scalability,
availability and usability over security.
1999
The Melissa Virus infects
Enterprise
Microso Word documents
and automatically
disseminates itself as an
aachment to the first 50
names in an infected
computer's Outlook email
Security
address list. $80 million in
total damages. 1
is born
Sources 2
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
2 www.cyberexperts.com/history-of-cybersecurity/
29 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 30
31 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 32
7’0”
SUSPECT: ILOVEYOU WORM
MAY 2000
6’6”
The ILOVEYOU worm, a.k.a.
love bug, infects government 2000
6’0” and private systems USB flash drives, also known as jump
worldwide. In response, the drives, memory sticks or thumb drives,
U.S. pushes for the Council of enter the market. This new form of
5’6” Europe Cybercrime Treaty, to portable storage consists of flash
harmonize computer crime memory paired with an integrated USB
laws among nations.2 interface. They quickly replace CDs
5’0” and floppy disks due to their smaller
size, quicker read/write speeds, increased
storage capacity and greater durability.4
4’6”
SUSPECT: MAXIM
Y
MAFIABO
SUSPECT:
3’6”
OCTOBER 2000
3’0” A hacker aempts to extort
$100 thousand from an
internet music retailer aer
2’6” FEBRUARY 2000
stealing customers' credit
card information. The retailer 2000
A 15-year-old Canadian refuses to pay, prompting the The Clinton
high school student hacker to post the customers' administration
named Michael Calce, aka credit card info.1 releases a national
MafiaBoy, performs a cybersecurity strategy,
distributed denial of which is later dropped.5
service (DDoS) aack on
Sources
several prominent websites, 1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
causing an estimated $1.2 Earthworms can grow up to 2 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx? ; 2013
9.8 feet (3 meters) in length!³ 3 www.welcomewildlife.com/all-about-earthworms/#:~:text=Earthworms%20vary%20widely%20in%20size,feet%20(3%20m)%20long!
billion in damages.1 4 www.computerhistory.org/timeline/2000/ ; 2020
5 www.pbs.org/wgbh/pages/frontline/shows/cyberwar/etc/faqs.html ; 2003
33 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 34
2001
Code Red worm INTERNET ATTACK
2002
is Unleashed COD
RED
E
2001
Microso releases
Windows XP
The thirteen Domain Name
System (DNS) root servers are
targeted by an hour-long DDoS
aack, though most internet
Carbonated Fact operating system.3 users are unaffected.4
Named code red because the discoverers were
drinking Mountain Dew Code Red when they found
the worm.1
2003
July 19th, 2001
CODE-RED
VERSION 2 1 Million The Department of
RELEASED. 1 of the 5.9 million
Homeland Security (DHS)
Microso IIS web
begins operations and
359 THOUSAND servers were infected2
creates the National
devices infected in just
Cybersecurity Division.4
15 HOURS. 1 Estimated worldwide cost
of Code Red Sources
$2.6 Billion 2
1 www.caida.org/research/security/code-red/#background
2 www.sans.org/reading-room/whitepapers/dlp/paper/87#:~:tex-
OPTIV HISTORY
t=The%20Code%20Red%20worm’s%20costs,were%20infected%20 2002: The other half of what
by%20Code%20Red.
3 www.computerhistory.org/timeline/2001/ ; 2020
later became Optiv,
4 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cy- Accuvant, is founded.
bercrime-from-1834-to-present/ ; 2019
35 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 36
FOR
THOSE OPERATION CYBER SWEEP
The United States Justice Department announces
Operation Cyber Sweep, which results in more than
70 indictments and 125 convictions or arrests for cyber
crimes and fraud, including hacking, phishing and spam.1
WHO WISH
2003
TO PLAY ALBERT GONZALES IS ARRESTED IN
IN THE
2003 FOR HIS ROLE IN SHADOWCREW
2008
ShadowCrew was a group which stole credit and debit card
information and sold it online. Gonzales begins working
with authorities in exchange for his freedom. From 2006
until his arrest in 2008, he takes part in another string of
credit and debit card the s targeting TJX, Heartland
SHADOWS
Payment Systems and a prominent bank, neing him
millions of dollars.1
Sources
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
37 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 38
2004
Brian Salcedo a empts to steal customer
credit card information from a major home
improvement retailer and is sentenced to 9 years.2
2004
A 41-year-old Nigerian citizen targets a consumer data
broker and compromises data on 163 thousand
customers. Initially only 35 thousand people were
Spirit Rover arrived on informed of the breach, but media pressure later revealed
Mars in Jan 2004. NASA an additional 128 thousand people were affected.2
has since hacked it
multiple times.4
Sources
1 www.computerhistory.org/timeline/2004/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.nasa.gov/feature/nasa-hacks-the-real-stories ; 2015
39 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 40
The Breach Epidemic!
2021
Damage related to global cybercrime is
Sources
1 www.securityboulevard.
com/2018/03/the-data-breach-epi-
demic-no-info-is-safe/ ; 2018
:40
2 www.cybersecurityventures.com/
cybersecurity-market-report/ ; 2019
3 www.thebalance.com/u-s-federal- 2016
budget-breakdown-3305789 ; 2020
4 www.statista.com/statistics/737504/
us-fed-gov-it-cyber-security-fy-bud-
get/ ; 2020
41 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 42
Th e future is
lookin g ‘Cloud’y
2005 2006
Cybercriminals steal the
2006
A Veteran's Affairs Department (VA)
The Canadian Anti-Fraud Centre reports over
information of 45 million credit laptop containing records on 26.5 million
11 thousand identity the complaints with losses
and debit cards from a large, active duty military and veterans is stolen
totalling $8.5 million.
Massachuses-based retailer. during a burglary.
2006
2005 2006
Security breaches at two Wikileaks is founded by a group of 2006
major clothing retailers Hadoop 0.1.0 is released. Hadoop is a journalists and chartered in Iceland. Amazon releases Elastic Compute Cloud.
expose transaction collection of open-source so ware This site allows users to anonymously This popularizes what becomes known
information on over utilities developed by the Apache upload documents and is frequently as cloud computing, a service model
1 million credit cards. So ware Foundation which provide a used to distribute news leaks and where users have on-demand access to
framework for a cluster of computers to secret documents from governments computing resources without the need
process big data efficiently. It can and private organizations. to manage them.
automatically handle hardware failures
as it was built with the assumption that
these are common occurrences. It The site and its founder,
quickly saw widespread adoption, with Julian Assange, became
more than half of Fortune 50 companies world famous after the
Identity theft is the fastest using it by 2013. release of over 200
growing form of consumer thousand United States
fraud in North America. diplomatic cables in 2010.
Sources
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cyber-
crime-from-1834-to-present/ ; 2019
43 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 44
2007 2008 2009
2007 2008 2009
Arash Ferdowsi and Drew Anonymous targets the Satoshi Nakamoto, whose true identity
Houston found Dropbox, a Church of Scientology's remains unknown, releases the source code
cloud storage service.1 website with 500 DDoS for Bitcoin. Bitcoin is a decentralized digital
a acks in one week as part currency based on blockchain technology
of an activist movement known as cryptocurrency.1
called "Project Chanology."2
Sources
1 www.computerhistory.org/timeline/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1http://gcn.com/Arti-
cles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1 ; 2013
45 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 46
47 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 48
2010
A cybercrime ring steals $70 million
from banks in the United States
with the Zeus Trojan malware,
diverting the money to Eastern
Europe before being caught.3
2010 United States and Israeli
intelligence services co- The Zeus Trojan malware (o en
develop the Stuxnet worm, called Zbot) is still around today!
designed to sabotage Iran's
nuclear program. It is It works in two ways:
1
considered the first
weaponized Spam Messages
2
malware.1
Drive-By Downloads4
What is
Stuxnet didn’t work like other
worms and viruses before it.
Trojan
Malware?
Instead of only stealing information,
the virus physically affected
the computers it infected.2
Trojan Horse so ware, or a Trojan
virus is a type of malware that is
disguised as legitimate so ware.4
Sources
1 www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/ ; 2019
2 www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ ; 2014
3 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
4 www.kaspersky.com/resource-center/threats/zeus-virus
49 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 50
2011
A splinter group of the hacking collective Anonymous, known as
Lulz Security or LulzSec, targets Fox.com and Sony's Playstation
Network (PSN) among 250 public and private organizations.
Through these aacks, they gain access to the credit card
information of over 100 million PSN users, costing Sony more
than $170 million. They publicize these hacks through Twier to
shame owners for their insufficient security. 2
2011
2011 Aackers with Chinese IP
addresses expose the personal
information of 35 million South
Millions of email addresses are
Koreans by uploading malware
2010-2015
compromised in a cyberaack
to a server which updates
on Epsilon, which provides
ESTso's ALZip compression
email and marketing services
soware. The hackers gain
to their clients.2
access to names, birthdates,
genders, telephone numbers,
street and email addresses, user
IDs and hashed passwords.2
Sources
A group of five Eastern European hackers steal press releases from 1 www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-
several newswire agencies before they can be announced.1 of-the-2010s/ ; 2019
2 cybersecurityventures.com/cybersecurity-ceo-the-history-of-cyber-
crime-from-1834-to-present/ ; 2019
51 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 52
The Internet of
Things
2011 1 in 10 2011
The United States
enterprises now use ten or announces the National
Nest Labs releases their Nest more AI applications; chatbots, Strategy for Trusted
Learning Thermostat as part of the process optimization and fraud OPTIV HISTORY
Identities in
analysis lead a recent survey’s Fishnet Security
nascent Internet of Things. The Nest Cyberspace, an
top use cases.3 acquires Logic Trends,
uses machine learning to adapt to a initiative to foster trust
boosting their identity
user's preferences and save energy between
and accessindividuals
management
when no one is home.1 (IAM)organizations
and expertise. on
the internet1
2011
Apple releases the iPhone
2012
4S with a built-in,
voice-activated personal
By 2025—more assistant named Siri.1
than
than 75
75 IoT
billion
devices billion
IoT devices will
will be connected
be connected to
to the web. 2
The Raspberry Pi is released by the
the web. 2
foundation of the same name. This
small computer is easy to use and
Sources simple to program, making it
1 www.computerhistory.org/timeline/2011/ ; 2020
extremely popular among hobbyists
2 www.securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2 ; 2020
Sources
3 www.forbes.com/sites/louiscolumbus/2020/06/04/10-ways-enterprises-are-getting-results-from-ai-strategies/#606d8f386fdb ; 2020 and students.4
1 https://www.computerhistory.org/timeline/2011/
4 www.opensource.com/resources/raspberry-pi
2 https://securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2
3 https://www.forbes.com/sites/louiscolumbus/2020/06/04/10-ways-enterprises-are-getting-results-from-ai-strategies/#606d8f386fdb
4 https://opensource.com/resources/raspberry-pi
53 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 54
2013
Yahoo!
Yahoo suffers the largest data
breach in history, affecting all
three billion user accounts. The
company failed to report the
breach until 2016, leading to a
$35 million dollar fine from the
Securities and Exchange
Commission (SEC).1
Sources
1 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020
55 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 56
AUGUST 2013
The first data breach occurred on
Yahoo! servers in August 2013; Yahoo!
stated this was a separate breach
from one which occurred in late 2014
and was conducted by an
"unauthorized third party". Yahoo!
reported the breach on December 14,
2016, and forced all affected users to
change passwords, and to reenter any
Andrew Komarov, CIO of the In February 2017, Yahoo!
unencrypted security questions and
cybersecurity firm InfoArmor, notified some users that
answers to make them encrypted in
had been helping Yahoo! and law data from the breach and
the future.
enforcement in response to the forged cookies could have
Peace data. In trying to track down been used to access these
the source of Peace's data, he During the second half of accounts. This breach is
discovered evidence of this latest 2016, Yahoo! reported two now considered the
breach from a dark web seller major data breaches largest known breach of
perpetrated by hackers. its kind on the Internet.
offering a list of more than one
billion Yahoo! accounts for about
September 2016, the company
$300 thousand in August 2015. In October 2017, Yahoo!
said that at least 500 million of
updated its assessment of
its accounts were hacked in
the hack, and stated that
2014 by what it believed was a
it believes all of its
state-sponsored actor.
3 billion accounts at the
time of the August 2013
In December 2016, it was
learned that an even bigger breach were affected.
breach took place in August
2013.
2015
2016
57 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 58
2013 In the wake of the Snowden
leaks, President Obama requests
$769 million to improve the
Department of Homeland
Former CIA employee and NSA contractor Edward Snowden leaks
Security's information security. 2
hundreds of thousands of documents from multiple confidential
national security programs. Included was PRISM, a program where
the NSA collected data with the assistance of Facebook, Google and
Microso.1 These leaks divided the United States and caused many to
A subject of
lose trust in the government.
controversy, Snowden
has been variously
called a hero,
a whistleblower, a
dissident, a patriot
and a traitor.
Sources
1 www.varonis.com/blog/events-that-changed-cyber-
security/ ; 2020
2 www.trumancenter.org/doctrine-blog/cyber-security-
in-the-wake-of-snowden/
59 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 60
CRYPTOWALL
CryptoWall ransomware first
appears. This malware targets
Windows PCs and eventually
2013
earns an estimated $325 million
Your private key will be
for cybercriminals.2
destroyed on:
2014
Aackers breach systems
supporting a major hotel chain in
Place Bid
2014 and remain in the system. The
breach was not discovered until
September 2018, during which time
A cyberaack on the world’s largest the thieves stole data on nearly 500
auction website exposes the personal million customers.2
information, including name, address,
date of birth and encrypted password, of
all 145 million users.2
Sources:
1 www.computerhistory.org/timeline ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.sentinelone.com/blog/history-of-cyber-security/ ; 2019
61 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 62
2014 Ironically, companies who
were running a version of
Affected Patched
100% Social Sites
83%
80%
Email Sites
Other Sites
60%
50% 50% 50%
Retail Sites
40% 40%
40%
25% 25%
20%
Sources:
0
1 www.computerhistory.org/timeline/ ; 2020
2 www.securityaffairs.co/wordpress/23878/intelligence/statistics-impact-heartbleed.html ; 2014
63 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 64
The
JANUARY 2015 AUGUST 2015
Accuvant and FishNet Security Optiv launches
complete their merger. This new branding, and
creates the nations largest begins conducting
comprehensive pure-play business as Optiv.
cybersecurity solutions provider
Optiv
with approximately 1,400
employees and a combined
revenue of $1.5 billion.
APRIL 2015
Accuvant and FishNet Security
Story
officially announce the new
JULY 2015
name - Optiv Security.
Optiv announces general
availability of proven security
JUNE 2015 program strategy services. This
Optiv ranks no.26 on The Channel beer equips organizations to plan,
Company's 2015 CRN Solutions build and run business-aligned and
Provider 500. threat-aware security programs.
2015 2016
65 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 66
2015
Hackers steal 4.2 million personnel
files of current and former
employees from the United States
Office of Personnel Management in
2015 one of the largest government
Lockerpin malware is discovered. breaches in the nation's history.
It is considered the first
ransomware able to permanently
lock Android smartphones or
tablets by rese ing a user's PIN.
Files included 21.5
million security
clearance background
investigations and 5.6
million fingerprints.
2015
A large insurance company reports a
breach of their systems in which the
personal information of 78.8 million
current and former customers is stolen.
Sources:
1 www.cybersecurityventures.com/cybersecurity-ceo-the-histo-
ry-of-cybercrime-from-1834-to-present/ ; 2019
2 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020
67 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 68
2017
WANNACRY
WORM
1
01
0101
110101
01010101
0101101010
101010101010
1010101010101
0101111001010
101010101010
101010101
0101
operating systems.2
69 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 70
BAD
How did this happen?
Initially hacked via a consumer
complaint web portal. A widely
CREDIT
known vulnerability that
should have been patched but,
due to failures in internal
processes, wasn't.2
2017
network undetected for
months because the credit
bureau failed to renew an
encryption certificate.2
The company did not
publicize the breach
until more than a month
aer they discovered it
had happened.2
2020
the People's Liberation Army, a
Chinese state-sponsored group,
holding them responsible for the
largest state-sponsored theft of
Sources: personal information ever recorded.
1 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
71 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 72
BUSTED
2019
Cisco Talos researchers discover 74
Facebook groups dedicated to cyber
OPTIV HISTORY
September 2018:
Optiv launches integrated
services portfolios.
crime, including the sale of stolen
credit card information and identities,
spam lists and hacking tools. Aer 2019
pressure from Cisco, Facebook deleted
these groups, though new ones The United States Federal Bureau of
continue to appear.1 Investigation (FBI) notifies Citrix that
cybercriminals had likely accessed the
company's internal network through the
use of "password spraying", a brute force
technique where hackers use common
passwords to a empt to access a large
3
number of employee accounts.1
2017
Taco Hack OPTIV HISTORY
Eastern European cybercriminals July 2019: Optiv establishes availability
use phishing techniques to steal of Advanced Fusion Center solutions
the credit card information of designed to enable organizations to
millions of Chipotle customers.1 accelerate cybersecurity maturity
and improve operational outcomes.
Sources:
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
73 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 74
6’
6’
75 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 76
It’s hard to talk about 2020
without mentioning the
Coronavirus Pandemic. 2/29/2020
First recorded COVID-19 death
in the US.6
6/1/2020
12/31/2019 1/21/2020 Colorado health officials
A pneumonia case of First reported case in the US.4 announce they expect a
unknown cause in Wuhan, 4/4/2020 bigger second wave of
China is reported to the WHO.1 COVID-19 case count Coronavirus than the first.
2/15/2020 tops 1 million.1
World Health Organization
1/9/2020 (WHO) Director General
First reported death calls on the international
from COVID-19.3 community to stand
together at the Munich
Security Conference5
2020
"Coronavirus map" app Microso warns hospitals and Medical Leave Act, have, while enabling continuous business
using AZORult to about the risks of small business disaster and operational change and keeping pace
Nation-State actors steal information ransomware a acks due relief funds and parcel with ever-changing threats in order to
reported to use and download to insecure VPN devices delivery services to identify and thwart would-be hackers and
COVID-themed lures.1 additional malware.3 and gateways.5 deliver malware.9 respond rapidly to malicious activity.
- General David Petraeus
APRIL 3
FEB 15 MARCH 20 MAY 6 MAY 13
CFOs plan to
Suspicious email FBI Internet Crime United States and The gap between
permanently shi
messages appearing Complaint Center warns United Kingdom cybersecurity risk and
significant numbers
to be from WHO of a rise in fraud due to security agencies defensive effectiveness is
of employees to
a empt to take COVID-19, including fake identify hacking as wide as it’s ever been for
remote work.6
advantage of the CDC emails, phishing campaigns by advanced most companies.11
COVID-19 emergency.2 a empts and counterfeit APRIL 7 persistent threats
treatments and Fake Zoom installers targeting healthcare MAY 13
equipment.4 being used to and medical Fraudsters use COVID-19 to
distribute malware researchers fighting target younger generations.12
are discovered.7 the coronavirus.10
Sources:
1 ZDNet APRIL 16 3 Business Insider
MAY 18
2 WHO, Rolling updates on coronavirus disease (COVID-19) 4 FBI.gov
5 Microsoft Google blocks 18 million 10 CISA The Global Cybersecurity Market
6 Forbes COVID-related malware 11 Forbes
Assessment for 2020 predicts growth
7 Bleeping Computer 12 Security Magazine
8 Talos Intelligence and phishing emails 13 Business Insider
deviations due to COVID-19 and places the
9 Securityintelligence.com
per day over the market at $230 Billion in 2021.13
previous week.8
79 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 80
Working “Home is the new enterprise” – Dave Dewalt
from Home
PREDICTION
OPTIV HISTORY Based on historical trends, employees
April 2020: Kevin Lynch who worked remotely before the
is named as CEO of Optiv pandemic will do so more often once
offices reopen. We also predict that
significant numbers of those who had
never worked remotely before the
Shift
pandemic will continue to work from
home in some capacity. We estimate
that 25-30% of the workforce will work
from home multiple days per week by
2020
compatible with working remotely.
Working Remotely
3.6%
As of 2018, 3.6% of the United States
70
60 March 3-April 2
“A typical employer workforce, some 5 million people, work from
home half of the time or more. According to a
can save about
2016 Gallup poll, 43% of employees work from 50
$11 thousand/year for home at least some of the time. We predict
every person who that the longer people are required to work
works remotely half of from home, the more widespread its adoption 40
the time.” will be in the long term.
Kate Lister, President Of Global Workplace Analytics 30
March 13-15
Sources: 20
www.globalworkplaceanalytics.com/work-at-home-after-covid-19-our-forecast
www.news.gallup.com/poll/306695/workers-discovering-affinity-remote-work.aspx
10
81 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 82
Top Six 3 We may see the first cases of deepfakes being
used to manipulate stock prices.
Cybersecurity
Trends for 4 Election misinformation campaigns are
expected to proliferate.
2020
1 2 75-80% of the United States
workforce now works from
Apple’s much-talked-
about “privacy as a
5 Anticipate widespread realignment of IT and
security organizations.
6
home. Remote work increases human right” campaign
pressure on securing your should cause others to
environment. follow.
Sources:
www.optiv.com/explore-optiv-insights/blog/top-six-cybersecurity-trends-2020 ; 2019
83 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 84
THE PAST THE FUTURE
If the trajectory of our past indicates anything, EMAIL AND PHISHING MOBILE PHONES
it's that we can expect a wild ride ahead. The
rapid pace of innovation in threats, technologies ARTIFICIAL INTELLIGENCE (AI)
RANSOMWARE
and services have informed these predictions of
what we can expect in our near future.
THE CLOUD INTERNET OF THINGS (IOT)
85 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 86
You’ve 55%
More than
Got
of companies in 2019
fell victim to at least one
successful phishing aack.2
PREDICTION
Email will continue to be one of the
Mail
most aractive systems targeted
66%
by aackers through phishing and
other techniques to steal credentials,
implant malware and encourage wire
transfer fraud.
of malware is installed via
malicious email aachments3
Impacts of Successful
Phishing Aacks2
The very first email was
60% 40% 20%
250B
sent in 1971, today
LOSS OF DATA
Sources:
Prediction written by J.D. Padgett FINANCIAL LOSS/WIRE TRANSFER FRAUD
1 www.atmail.com/blog/10-email-facts-to-impress/ ; 2018
2 Proofpoint 2020 State of the Phish Report ; 2020
3 www.varonis.com/blog/cybersecurity-statistics/ ; 2020
87 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 88
Ransomware:
Computing
PREDICTION #1:
It is a maer of time before aacks compromise our critical
infrastructure potentially holding entire regions of the
country hostage with energy outages. Just look at the
Gets Personal
impact to cities and towns when their local government
gets hit with ransomware.
PREDICTION #2:
There is currently no defense against deep fake videos and
Optiv Domains
people have shown a propensity to believe news that fits their
bias. Clearing your name aer a deep fake video has gone viral
on social media will be extremely difficult, if not impossible,
and in many cases the damage will have already been done. Plus,
you can never truly remove the deep fake video from the
Internet so you will need to defend yourself again and again in
the future. Since private companies control social media
platforms, the response to removing deep fake videos will be
inconsistent and change with the political landscape.
PREDICTION #3:
As technology becomes more and more embedded in medical
devices, human organs could be held for ransom. Imagine
Sources:
Predictions written by Brian Wrozek, Optiv VP, Corporate Security, Risk and Compliance Management and Physical Security
1 www.census.gov/content/dam/Census/library/publications/2017/acs/acs-37.pdf ; 2015
89 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 90
On Cloud 60%
Workloads in
the Public Cloud2
Nine
2020
80% 99%
PREDICTION Through 2023, at least 2019
2018
50% 24%
By 2021, Cloud assets were involved in
Sources
1 www.theesa.com/esa-research/2019-essential-facts-about-the-computer-and-
20%
video-game-industry/ ; 2018
Sources:
2 www.cisomag.eccouncil.org/gaming-industry-suffered-12-billion-cyber-attacks-
Prediction written by Joe Vadakkan
in-past-17-months/ ; 2019
1 Gartner 5 Things You Must Absolutely Get Right for Secure IaaS and PaaS ; 2020
2 Flexera (Rightscale) State of the Cloud-Report from 2019 and 2020 ; 2020
91 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 92
It's
DID YOU KNOW?
Your mobile
phone has more
Your computing power
than the computers
22%
continue to increase. The user played a role in
interface for mobile devices oen
makes it more challenging to
identify phishing and mali-
cious links. In addition,
of external a acks
COVID has potentially
in 2019.2
forced a relaxation of
BYOD security policies
(but hopefully only
temporarily).
1973
call was made on April 3rd
Sources:
Prediction written by J.D. Padgett 3
1 www.factslides.com/s-Mobile-Phones ; 2017
2 Forrester Top Cybersecurity Threats in 2020 ; 2020
3 www.techcrunch.com/gallery/10-amazing-facts-you-probably-dont-know-about-mo-
.
bile-phones/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_re-
ferrer_sig=AQAAAFSivrbP3NvXJ6kEjGKF8OAQZB6r8UsW8vatcYAYc3Uwo_PXI_hyQTk4d-
CELmZMs2NUoigp_DX6Mb9bMpSb5pP-WLTA8ay4R_1_jX8GIrrB-6EhCg2x3HDSKI6D2aQ_jBnn-
QYI9m6k_0hMjDd4QpRqzFjlQ1cGjVhtI592BewQHP ; 2016
93 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 94
The Power AI CAN BE USED TO DEVELOP “ DEEPFAKES”
by using freely available video of public
of AI
figures or influencers and completely
altering the words being spoken in a
nearly imperceptible way.
Deepfakes will increasingly be
used by cyber criminals to steal
sensitive information,
PREDICTION convince victims to disburse
money to them, or
AI-enabled aacks will rise from the
manipulate public
#8 ranked threat today to the #4
perception around
ranked threat in just two years. 1
important issues.
AI can relieve
overburdened security
teams by automating MALWARE WILL BE INFUSED WITH AI
key steps of the threat smarts to adapt to best avoid detection,
and change its tactics real-time based on
prevention, detection the victim’s unique environment to
52%
95 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 96
These are a
few of my
50%
By 2024, at least
PREDICTION
Cyber losses related to connected IoT
devices will increase substantially to the
2nd most problematic component of IT
infrastructure contributing to cyber loss.
IoT is currently seen as the 11th.3
VROOM VROOM
The number of IoT units built into Automotive
and Enterprise solutions will more than double Sources:
over the next 5 years, from 5.8 billion in 2020 to Prediction written by J.D. Padgett
1 Gartner IoT Forecast as of July ; 2020
12.1 billion in 2025.1 2 Gartner Predicts 2019: IoT Will Drive Profound Changes to Your Core Business Applications and
IT Infrastructure ; 2018
3 Optiv/ESI Security Executives Survey ; 2020
97 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 98
WHY OPTIV?
SINGULAR FOCUS FLEXIBLE CYBERSECURITY
ON CYBERSECURITY MODELS
Our staff is comprised of skilled Our flexible cybersecurity
cybersecurity professionals who models are intended to help your
eat, sleep and breathe organization be er support
cybersecurity; providing you continuously evolving business
with unmatched insight and needs. We enable you to optimize
perspective, depth and breadth and rationalize existing
of services. cybersecurity programs so that
ical Integrat your organization can evolve in
chn io
Te n END-TO-END highly effective and integrated
INTEGRATION SECURITY CAPABILITIES ways, and transform how you are
ADVISORY
AND INNOVATION OPERATIONS We are a leading security procuring, consuming,
solutions integrator (SSI), digging integrating, implementing and
into your existing program, operationalizing cybersecurity.
identifying what is working and
PLAN BUILD RUN what’s duplicative, determining INSIDE-OUT APPROACH
us n what it takes to get your security
on
pe We start with the core
B
in e io ti
O
s s I n te g ra t ra t
i o n a l E xe c
u right and stubbornly effective, requirement of every enterprise –
and then executing with risk mitigation – and build out
precision. Aer we deliver from there with individually
solutions that work, we provide customized strategy,
the expertise and offerings to infrastructure, rationalization,
handle as li le or as much of the operations optimization and
ongoing management burden as ongoing measurement. This is
you want. how you, your organizational
leaders and your board can
BREADTH OF
reverse the toxic trends you face
EXPERIENCE
today and turn your security
Our solutions are designed to
operation inside-out.
address your specific business
objectives, and drive desired
positive outcomes.
99 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 100
OUR SERVICES
IDENTITY INTEGRATION
CYBER DIGITAL AND DATA RISK SECURITY THREAT AND
TRANSFORMATION MANAGEMENT MANAGEMENT OPERATIONS MANAGEMENT INNOVATION
As your trusted digital Rather than procuring Optiv’s Risk Management By integrating threat Optiv’s threat management Optiv’s Integration and
transformation (DX) and implementing siloed and Transformation intelligence, risk approach allows your Innovation services help
partner, Optiv aligns your solutions, Optiv helps you services align your management profiling, organization to identify break down security
business objectives with a integrate critical identity organization’s security orchestration and vulnerabilities and technology silos to
security-by-design and data management program with business automation tools, and malicious activity faster, maximize the effectiveness
approach, connecting agile (IDM) elements into a needs to reduce risk. We advanced and automated reduce threat actor dwell of your organization’s
processes and controls comprehensive, flexible are the only security analytics applied to time and build security current investments.
with emerging security and solution that is delivered solutions integrator that ongoing data capture, into your infrastructure These services help you
cloud technologies for a as-a-service, as a managed can guide you through an Optiv has changed and applications from the expand and custom-build
successful digital program. service, or on-premise. entire security journey, cybersecurity operations to start, enabling a stronger unique solutions to
We enable your Optiv’s strategic IDM from initial concept and be highly scalable, security posture. streamline business and
organization to achieve the programs allow you to design to program responsive and flexible to cybersecurity challenges.
flexibility you need to provide the right people management and your unpredictably shi ing
confidently secure, scale access to the right data – optimization, and support business needs.
and adapt to new emerging in the right manner – all points in between.
trends while delivering any maintaining trust and
DX initiative. compliance for your
business and your
customers.
101 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 102
REFERENCES
103 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 104
THANK YOU
Designed by the
Optiv Creative Team
Jeanne Bacque
Rachel Briggs
Melina Chastain
Rafael Encarnacion
Joel Hawkins
Mike Hill
Joel Jackson
Kaitlan Kelly
Martha LeBlanc
Matthew Watkins
Research by
Jeanne Bacque
Rachel Briggs
Melina Chastain
Rafael Encarnacion
Joel Hawkins
Mike Hill
Joel Jackson
Kaitlan Kelly
Martha LeBlanc
J.D. Padgett
Matthew Watkins
Brian Wrozek
Editing by
Jeanne Bacque
Michael Clark
J.D. Padgett
Alex Safransky
Optiv Global Headquarters
Project Management by 1144 15th Street, Suite 2900
Jeanne Bacque Denver, CO 80202
Rachel Briggs
Charleigh Loder
800.574.0896 | optiv.com
7.20 | RB | 1