Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

ILoveYou!

A Future is
looking Cloud-y

VISUAL
1970 HISTORY 2020

OF
CYBERSECURITY

“Catch me if
you can!”
INTRODUCTION 01 - 02

1970-1979 03 - 10

1980-1989 11 - 20

1990-1999 21 - 30

2000-2009 31 - 46

2010-2019 47 - 74

2020 75 - 84

PREDICTIONS 85 - 98

OPTIV INSIGHTS 99 - 102


A
VISUAL
HISTORY
OF
CYBERSECURITY
From the invention of ARPAnet in 1968, to the rise of
personal computing in the 1980’s and telecommuting in the
21st century, this book examines the technological history
that brought us here today. Cybercrime has evolved at a
breakneck pace alongside the digital advancements of the
past five decades, and cybersecurity and cyber professionals
have been forced to adapt to a market of nonstop growth.

We hope this book provides a compelling visual snapshot of


the history that led the cyber industry to where it is, along
with our bold predictions for the future. To start, lets take a
trip back to 1970...

1 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 2
KEEP ON HACKIN’

K E E P O N H A C K IN ’
100110010

3 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 4
Don’t Fear the Reaper
1970 Soon aŸer the first virus, codenamed
UofU
“Creeper,” came the first anti-virus,
NEVADA ARPANET, the precursor to
appropriately named “Reaper.”3
UTAH the modern Internet, releases
SRI the Network Control Protocol
CA (NCP) allowing computers at
LI remote locations to transfer
FO files between computers.2
RN “I’m Creeper, the
IA first ever computer
UCSB
ARIZONA 1970 virus! Catch me if
UCLA Funky Fact
The first computer virus is created you can.”
The first four
by Bob Thomas as a non-
computer network
malicious program that moves
nodes in ARPANET
through computers displaying the
were all universities.2
message, "I am the Creeper,
catch me if you can."3
1970

Shakey the robot, the first artificially intelligent


mobile robot, is featured in National Geographic as an
example of the future possibilities of computers.
Receiving computer commands via radio link, Shakey
used a TV camera, laser range finder and bump sensors
to collect data.1

“I was inducted into Carnegie Mellon


University's Robot Hall of Fame in 2004 ALSO 1970
alongside my robo-buds ASIMO and C-3PO.” Published in 1970 and declassified in
1975, the 82-page Ware Report was
authored by computer science legend
d Willis Ware and his team. The report
outline
o that
Sources
e m outlined what were then largely
1 www.ai.sri.com/shakey/; 2020
1970 m toda .
y
2 www.theconversation.com/how-the-internet-was-born-from-the-arpanet-to-the-internet-68072 ; 2016
e R e p o r t: A e a t we face theoretical weaknesses in networks.
War curity
th r
y be rs e
3 www.latrobe.edu.au/nest/fascinating-evolution-cybersecurity/
4 www.digitaltrends.com/computing/cyberscurity-1970-memo-ware-report/ ; 2016 eve r y c They're now very real.4

5 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 6
1971 APRIL FOOLS 1976
Steve Jobs and Steve

1975
Wozniak launch the
John Draper legendarily discovers a Apple I personal computer
method to unlock free long distance on April Fool's Day, with a
calls using a 2600 hertz frequency single circut board.3
tone produced by a toy whistle
found in Cap’n Crunch cereal boxes.

This "phreaker" subculture fostered


influential digital visionaries like Paul Allen and Bill Gates, two
Jobs and Wozniak, who were once friends, form their own
phone phreakers themselves.1
1971 software company, Microsoft.1

The "floppy disk" is invented by


Alan Shugart and a team of IBM
IBM 5100
engineers, allowing data to be $19,975
shared among computers.2 $20,000
COST OF PERSONAL
COMPUTERS IN THE 1970S

Commodore
$1,000 PET $110,105
Kenbak-1 $795 in 2020

PHREAKERS
$800 $750
TRS-80 $4,421
Altair $4,171
$595 in 2020
$565 in 2020
$600 $3,309
$3,142
in 2020
$400 in 2020

UNITE
Sources
$200

1 www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/ ; 2016
2 www.livescience.com/20718-computer-history.html ; 2017
3 www.worldsciencefestival.com/infographics/a_history_of_computer_science/

7 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 8
1976 1979
INSIDER ATTACK
XEROX PALO ALTO
Greg Chung of Boeing commits one of the worst RESEARCH CENTER
cybersecurity breaches in history, sending $2 billion
At the Xerox Palo Alto Research Center,
worth of stolen documents to China.
John Shoch and Jon Hupp create a
small program that searches a network
The binders contained thousands of for computers with idle processor time,
documents, including many design the first worm.
manuals related to U.S. military
aircraft—the B-1 bomber, the C-17
military cargo plane, the F-15 fighter jet,
and the Chinook 47 and 48 helicopters.1

Ironically, the first


worms were intended
It was like walking into to provide more efficient
King Solomon’s mine.1 use of computers.

2006
The FBI begins their investigation into Chung’s Worms demonstrated a capacity
possible espionage involvement. for invading any computer on a
network, creating the security
threat that continues with

2010
viruses today.2

Chung is sentenced to 15 years for hoarding and


Sources
sharing sensitive information. 1 www.newyorker.com/magazine/2014/05/05/a-new-kind-of-spy ; 2014
2 www.technovelgy.com/ct/content.asp?Bnum=190

9 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 10
PERSON OF
THE YEAR
THE COMPUTER MOVES IN

11 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 12
FUN FACT
The popular video arcade
game "Pac-Man" is released
in 1980. The original Japanese
title of Puck Man was
changed to Pac-Man for

1980
international releases as a
preventative measure
against defacement of the
IBM ignites the
arcade machines by
personal computer
changing the P to an F.

1981
market and
revolutionizes business
computing with
The first video game magazine
widespread industry
in the U.S. is founded and called
adoption. Formerly
Electronic Games. AŒer rapid
known as the IBM Model
success during its first two
5150, their first PC used
years, it faltered during the 1983
MicrosoŒ's MS-DOS
Video Game Crash and ceased
operating system and a

1982
publication in 1985.1
4.77 MHz Intel 8088
microprocessor.1
The U.S. reprograms
computer equipment
that was being purchased
through a front company

There
for a Soviet gas pipeline.
This proto-cyberaƒack
Commodore's VIC-20 home causes the pipeline
computer becomes a less to explode.2
expensive alternative to their
initial PET PC and is the first
PC to sell more than one

she blows
million units. Star Trek star
William Shatner appeared in
their advertisments.1
Sources
1 www.computerhistory.org/timeline/1980/ ; 2020
2 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cyber-
security.aspx?Page=1http://gcn.com/Articles/2013/05/30/
GCN30-Timeline-Cybersecurity.aspx?Page=1 ; 2013

13 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 14
1984
DOUBLE
DISASTER

1986
The Swiss company The Chernobyl
"Swatch" introduces
nuclear reactor
their watches and
they become a explodes in the USSR.
Apple’s iconic "1984"
fashion craze. The Space Shule
commercial airs on
January 22, 1984 during Markus Hess and his Challenger disaster
Super Bowl XVIII. accomplices are arrested takes place when the
in West Germany for space shule
Apple introduces the
hacking into the Lawrence disintegrates aer
Macintosh.1
Berkeley National being launched,
Laboratory and selling killing all on board.
stolen information to the
KGB, but only receive
suspended sentences.3

LIVE AREA LIVE AREA


1985

1987
President Reagan signs
Microso releases
the Computer Security
Windows-1.2
Act of 1987 to protect
the computer data of
federal agencies.1
Sources
1 www.computerhistory.org/timeline/1984/ ; 2020
2 www.worldsciencefestival.com/infographics/a_history_of_computer_science/
3 www.washingtonpost.com/archive/politics/1989/08/17/computer-hackers-face-spy-charges/
cad42e6b-73db-48d4-814f-86eb1574ae68/ ; 1989

15 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 16
“ [The Morris Worm] woke
the public up to the need

1988
Viruses become
more problematic for cybersecurity. Prior to
the invasion of the worm,
and widespread
following the
Morris worm. The
first dedicated
antivirus company
no attack had affected so
is also founded
many private users and

Rachel
this year.

companies at once.
HI! MY NAME IS
ROBERT MORRIS
Although the inflicted
Robert Morris' self-
propogating computer
damage was an accident,
worm succeeded in
closing down much of Morris was the first person
the internet and led to a
felony conviction. He to ever be convicted
received a sentence of
three years of probation,
400 hours of community
under the 1986 Computer “
service and a $10,050 fine.
Fraud and Abuse Act.2
Sources
Image: www.flickr.com/photos/intelfreepress/10477292993/ ; 2013
1 www.sentinelone.com/blog/history-of-cyber-security/ ;
2 www.captechu.edu/blog/cyber-security-impact-30th-anniversary-of-morris-worm

17 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 18
THE MORRIS WORM
CLOSED DOWN MOST
OF THE INTERNET
WHILE IT WAS ACTIVE...

SORRY, INTERNET IS CLOSED

19 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 20
Search

1 9 90
21 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 22
1993 (we’re still trying to close all of
the pop-up windows)
Marc Andresson creates
the first user-friendly
web browser under the
name Mosaic (later
known as Netscape.)

Error 993

Error 993

LIVE AREA LIVE AREA

1994
1990
A U.S. Air Force research facility discovers a
password "sniffer" was installed onto their network,
compromising over 100 user accounts. The two
hackers responsible were identified as Cowboy and
Kuji, working together under the name Datastream.2
Arpanet starts the operational network known as
the Internet, connecting approximately 2.6 million
people worldwide.1

HTTPS://
Sources
1 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1http://gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity. Netscape develops Secure Sockets Layer
aspx?Page=1 ; 2013
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019 encryption to ensure safer online transactions in
response to internet security concerns.1

23 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 24
1996

1995
The first Microso Word Health Insurance Portability and
virus spreads worldwide via Account Act (HIPAA), becomes law
macro commands. on August 21, 1996.

1996

President Clinton
initiates the President's
Commission on Critical
Infrastructure
Protection.

OPTIV HISTORY

1995
FishNet Security is
founded, one of two
companies which later
Russian soware engineer Vladimir merge to form Optiv.
Levin hacks Citibank's New York IT
system, illegally wiring an
estimated $10 million to accounts
worldwide from his apartment in Sources
Saint Petersburg. Image: Bob McNeely, The White House (Public Domain)
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
2 www.pbs.org/wgbh/pages/frontline/shows/cyberwar/etc/faqs.html ; 2003

25 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 26
MAX HACK

1998
Max Butler is imprisoned for
18 months a­er hacking U.S.
government websites in 1998.3

“ He's so good, the


FBI asks for his help.
But life as a "white hat
hacker" isn't exciting “

1998
Teenage hackers gain control of
enough for Max Butler.2
hundreds of computer systems used by
the military, government and private
sectors and steal a piece of NASA soware
2003
Once released in 2003, he commits
in an incident known as the "Solar Sunrise."
aacks, programs malware and steals

Systems are credit information using the internet.3

shut down for


three weeks.1 2007
In 2007 he is arrested again and pleads
guilty to wire fraud, stealing millions of
Sources
1 www.informationsecuritybuzz.com/articles/digital-dangers-brief-history-computer-security-threats/ ; 2014 credit card numbers and executing
2 www.cnbc.com/id/100000049 ; 2012
3 www. cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
nearly $86 million in fraudulent purchases.3

27 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 28
IT teams rushed applications onto the
web during this time, prioritizing
speed-to-deployment, scalability,
availability and usability over security.

1999
The Melissa Virus infects

Enterprise
Microso Word documents
and automatically
disseminates itself as an
aachment to the first 50
names in an infected
computer's Outlook email

Security
address list. $80 million in
total damages. 1

is born
Sources 2
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
2 www.cyberexperts.com/history-of-cybersecurity/

29 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 30
31 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 32
7’0”
SUSPECT: ILOVEYOU WORM
MAY 2000
6’6”
The ILOVEYOU worm, a.k.a.
love bug, infects government 2000
6’0” and private systems USB flash drives, also known as jump
worldwide. In response, the drives, memory sticks or thumb drives,
U.S. pushes for the Council of enter the market. This new form of
5’6” Europe Cybercrime Treaty, to portable storage consists of flash
harmonize computer crime memory paired with an integrated USB
laws among nations.2 interface. They quickly replace CDs
5’0” and floppy disks due to their smaller
size, quicker read/write speeds, increased
storage capacity and greater durability.4
4’6”

SUSPECT: MAXIM
Y
MAFIABO
SUSPECT:

3’6”
OCTOBER 2000
3’0” A hacker aŠempts to extort
$100 thousand from an
internet music retailer a’er
2’6” FEBRUARY 2000
stealing customers' credit
card information. The retailer 2000
A 15-year-old Canadian refuses to pay, prompting the The Clinton
high school student hacker to post the customers' administration
named Michael Calce, aka credit card info.1 releases a national
MafiaBoy, performs a cybersecurity strategy,
distributed denial of which is later dropped.5
service (DDoS) aŠack on
Sources
several prominent websites, 1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
causing an estimated $1.2 Earthworms can grow up to 2 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx? ; 2013
9.8 feet (3 meters) in length!³ 3 www.welcomewildlife.com/all-about-earthworms/#:~:text=Earthworms%20vary%20widely%20in%20size,feet%20(3%20m)%20long!
billion in damages.1 4 www.computerhistory.org/timeline/2000/ ; 2020
5 www.pbs.org/wgbh/pages/frontline/shows/cyberwar/etc/faqs.html ; 2003

33 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 34
2001
Code Red worm INTERNET ATTACK

2002
is Unleashed COD
RED
E
2001
Microso releases
Windows XP
The thirteen Domain Name
System (DNS) root servers are
targeted by an hour-long DDoS
aŠack, though most internet
Carbonated Fact operating system.3 users are unaffected.4
Named code red because the discoverers were
drinking Mountain Dew Code Red when they found
the worm.1

July 13th, 2001 August 9th, 2001


2001
CODE-RED ITS ALL OVER.
VERSION 1 Apple releases iTunes,
REL EASED. 1 a media player and library.3

2003
July 19th, 2001
CODE-RED
VERSION 2 1 Million The Department of
RELEASED. 1 of the 5.9 million
Homeland Security (DHS)
Microso IIS web
begins operations and
359 THOUSAND servers were infected2
creates the National
devices infected in just
Cybersecurity Division.4
15 HOURS. 1 Estimated worldwide cost
of Code Red Sources

$2.6 Billion 2
1 www.caida.org/research/security/code-red/#background
2 www.sans.org/reading-room/whitepapers/dlp/paper/87#:~:tex-
OPTIV HISTORY
t=The%20Code%20Red%20worm’s%20costs,were%20infected%20 2002: The other half of what
by%20Code%20Red.
3 www.computerhistory.org/timeline/2001/ ; 2020
later became Optiv,
4 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cy- Accuvant, is founded.
bercrime-from-1834-to-present/ ; 2019

35 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 36
FOR
THOSE OPERATION CYBER SWEEP
The United States Justice Department announces
Operation Cyber Sweep, which results in more than
70 indictments and 125 convictions or arrests for cyber
crimes and fraud, including hacking, phishing and spam.1

WHO WISH
2003
TO PLAY ALBERT GONZALES IS ARRESTED IN

IN THE
2003 FOR HIS ROLE IN SHADOWCREW

2008
ShadowCrew was a group which stole credit and debit card
information and sold it online. Gonzales begins working
with authorities in exchange for his freedom. From 2006
until his arrest in 2008, he takes part in another string of
credit and debit card the s targeting TJX, Heartland

SHADOWS
Payment Systems and a prominent bank, neƒing him
millions of dollars.1

Sources
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019

37 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 38
2004
Brian Salcedo a empts to steal customer
credit card information from a major home
improvement retailer and is sentenced to 9 years.2

The hacker group "Anonymous" forms.


It is a loose association of "hacktivists",
activist hackers, who initially targeted
websites in protest or as publicity stunts.
O'Reilly Media launches the Web 2.0 Conference,
Over time, they broadened their targets to
popularizing the term "Web 2.0" in reference to a new
include government agencies. Members of
type of website emphasizing user-generated content in
the group are referred to as "Anon" and
a virtual community. Typical Web 2.0 sites include blogs,
oen wear Guy Fawkes masks in public.1
wikis, social media sites or image and video sharing sites.1

2004
A 41-year-old Nigerian citizen targets a consumer data
broker and compromises data on 163 thousand
customers. Initially only 35 thousand people were
Spirit Rover arrived on informed of the breach, but media pressure later revealed
Mars in Jan 2004. NASA an additional 128 thousand people were affected.2
has since hacked it
multiple times.4

Sources
1 www.computerhistory.org/timeline/2004/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.nasa.gov/feature/nasa-hacks-the-real-stories ; 2015

39 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 40
The Breach Epidemic!
2021
Damage related to global cybercrime is

2005 projected to hit $6 trillion annually by 2021.2


The complete FY2021 federal budget for the
United States is $4.8 trillion.3 Of which $18.78 billion is
The so-called "data breach epidemic" begins.
reserved for all cybersecurity funding.4
157 data breaches are publicly reported this
year, including the first leak of over 1 million 2021 CYBERCRIME DAMAGE
credit card records. By 2017, that number $6 Trillion
increased tenfold to 1,579 data breaches.1
2021 US FEDERAL BUDGET
2005 2017 $4.8 Trillion

Frequency of Ransomware A acks

Cybersecurity Ventures expects that


2021 2021 FEDERAL CYBERSECURITY FUNDING Magnified x2
businesses will fall victim to a ransomware for visibility
$18.8 Billion (0.4% of the budget)
a ack every 11 seconds by 2021, up :11
from every 14 seconds in 2019 and
2019
every 40 seconds in 2016.2 :14

Sources
1 www.securityboulevard.
com/2018/03/the-data-breach-epi-
demic-no-info-is-safe/ ; 2018
:40
2 www.cybersecurityventures.com/
cybersecurity-market-report/ ; 2019
3 www.thebalance.com/u-s-federal- 2016
budget-breakdown-3305789 ; 2020
4 www.statista.com/statistics/737504/
us-fed-gov-it-cyber-security-fy-bud-
get/ ; 2020

41 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 42
Th e future is
lookin g ‘Cloud’y
2005 2006
Cybercriminals steal the
2006
A Veteran's Affairs Department (VA)
The Canadian Anti-Fraud Centre reports over
information of 45 million credit laptop containing records on 26.5 million
11 thousand identity the complaints with losses
and debit cards from a large, active duty military and veterans is stolen
totalling $8.5 million.
Massachuse‰s-based retailer. during a burglary.

2006
2005 2006
Security breaches at two Wikileaks is founded by a group of 2006
major clothing retailers Hadoop 0.1.0 is released. Hadoop is a journalists and chartered in Iceland. Amazon releases Elastic Compute Cloud.
expose transaction collection of open-source so ware This site allows users to anonymously This popularizes what becomes known
information on over utilities developed by the Apache upload documents and is frequently as cloud computing, a service model
1 million credit cards. So ware Foundation which provide a used to distribute news leaks and where users have on-demand access to
framework for a cluster of computers to secret documents from governments computing resources without the need
process big data efficiently. It can and private organizations. to manage them.
automatically handle hardware failures
as it was built with the assumption that
these are common occurrences. It The site and its founder,
quickly saw widespread adoption, with Julian Assange, became
more than half of Fortune 50 companies world famous after the
Identity theft is the fastest using it by 2013. release of over 200
growing form of consumer thousand United States
fraud in North America. diplomatic cables in 2010.
Sources
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cyber-
crime-from-1834-to-present/ ; 2019

43 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 44
2007 2008 2009
2007 2008 2009
Arash Ferdowsi and Drew Anonymous targets the Satoshi Nakamoto, whose true identity
Houston found Dropbox, a Church of Scientology's remains unknown, releases the source code
cloud storage service.1 website with 500 DDoS for Bitcoin. Bitcoin is a decentralized digital
a acks in one week as part currency based on blockchain technology
of an activist movement known as cryptocurrency.1
called "Project Chanology."2

2007 2008 2009


Hitachi announces A United States Central A series of cyber a acks, known as the Aurora a acks,
the first terabyte
hard disk drive.1
LIVE AREA Command employee
inserts a flash drive into
LIVE AREA
target Google and 33 other companies in an a empt to
steal intellectual property. The group, reportedly
their laptop, accidentally operating out of China, continues to target
releasing a worm into defense-related and other organizations.2
classified and unclassified
systems. This breach,
known as "Operation
Buckshot Yankee" and 2009
delivered by a foreign Mobile data speeds get a boost from the
intelligence agency, is the widespread adoption of 3G networks.3
worst to date and prompts
the Department of Defense
to revamp their cyber
defense strategy.3

Sources
1 www.computerhistory.org/timeline/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1http://gcn.com/Arti-
cles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx?Page=1 ; 2013

45 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 46
47 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 48
2010
A cybercrime ring steals $70 million
from banks in the United States
with the Zeus Trojan malware,
diverting the money to Eastern
Europe before being caught.3
2010 United States and Israeli
intelligence services co- The Zeus Trojan malware (o en
develop the Stuxnet worm, called Zbot) is still around today!
designed to sabotage Iran's
nuclear program. It is It works in two ways:

1
considered the first
weaponized Spam Messages

2
malware.1
Drive-By Downloads4

What is
Stuxnet didn’t work like other
worms and viruses before it.
Trojan
Malware?
Instead of only stealing information,
the virus physically affected
the computers it infected.2
Trojan Horse so ware, or a Trojan
virus is a type of malware that is
disguised as legitimate so ware.4

Sources
1 www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/ ; 2019
2 www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ ; 2014
3 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
4 www.kaspersky.com/resource-center/threats/zeus-virus

49 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 50
2011
A splinter group of the hacking collective Anonymous, known as
Lulz Security or LulzSec, targets Fox.com and Sony's Playstation
Network (PSN) among 250 public and private organizations.
Through these a‚acks, they gain access to the credit card
information of over 100 million PSN users, costing Sony more
than $170 million. They publicize these hacks through Twi‚er to
shame owners for their insufficient security. 2

2011
2011 Aackers with Chinese IP
addresses expose the personal
information of 35 million South
Millions of email addresses are
Koreans by uploading malware

2010-2015
compromised in a cyberaack
to a server which updates
on Epsilon, which provides
ESTso€'s ALZip compression
email and marketing services
so€ware. The hackers gain
to their clients.2
access to names, birthdates,
genders, telephone numbers,
street and email addresses, user
IDs and hashed passwords.2
Sources
A group of five Eastern European hackers steal press releases from 1 www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-
several newswire agencies before they can be announced.1 of-the-2010s/ ; 2019
2 cybersecurityventures.com/cybersecurity-ceo-the-history-of-cyber-
crime-from-1834-to-present/ ; 2019

51 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 52
The Internet of
Things
2011 1 in 10 2011
The United States
enterprises now use ten or announces the National
Nest Labs releases their Nest more AI applications; chatbots, Strategy for Trusted
Learning Thermostat as part of the process optimization and fraud OPTIV HISTORY
Identities in
analysis lead a recent survey’s Fishnet Security
nascent Internet of Things. The Nest Cyberspace, an
top use cases.3 acquires Logic Trends,
uses machine learning to adapt to a initiative to foster trust
boosting their identity
user's preferences and save energy between
and accessindividuals
management
when no one is home.1 (IAM)organizations
and expertise. on
the internet1

2011
Apple releases the iPhone

2012
4S with a built-in,
voice-activated personal
By 2025—more assistant named Siri.1
than
than 75
75 IoT
billion
devices billion
IoT devices will
will be connected
be connected to
to the web. 2
The Raspberry Pi is released by the
the web. 2
foundation of the same name. This
small computer is easy to use and
Sources simple to program, making it
1 www.computerhistory.org/timeline/2011/ ; 2020
extremely popular among hobbyists
2 www.securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2 ; 2020
Sources
3 www.forbes.com/sites/louiscolumbus/2020/06/04/10-ways-enterprises-are-getting-results-from-ai-strategies/#606d8f386fdb ; 2020 and students.4
1 https://www.computerhistory.org/timeline/2011/
4 www.opensource.com/resources/raspberry-pi
2 https://securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2
3 https://www.forbes.com/sites/louiscolumbus/2020/06/04/10-ways-enterprises-are-getting-results-from-ai-strategies/#606d8f386fdb
4 https://opensource.com/resources/raspberry-pi

53 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 54
2013

Yahoo!
Yahoo suffers the largest data
breach in history, affecting all
three billion user accounts. The
company failed to report the
breach until 2016, leading to a
$35 million dollar fine from the
Securities and Exchange
Commission (SEC).1
Sources
1 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020

55 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 56
AUGUST 2013
The first data breach occurred on
Yahoo! servers in August 2013; Yahoo!
stated this was a separate breach
from one which occurred in late 2014
and was conducted by an
"unauthorized third party". Yahoo!
reported the breach on December 14,
2016, and forced all affected users to
change passwords, and to reenter any
Andrew Komarov, CIO of the In February 2017, Yahoo!
unencrypted security questions and
cybersecurity firm InfoArmor, notified some users that
answers to make them encrypted in
had been helping Yahoo! and law data from the breach and
the future.
enforcement in response to the forged cookies could have
Peace data. In trying to track down been used to access these
the source of Peace's data, he During the second half of accounts. This breach is
discovered evidence of this latest 2016, Yahoo! reported two now considered the
breach from a dark web seller major data breaches largest known breach of
perpetrated by hackers. its kind on the Internet.
offering a list of more than one
billion Yahoo! accounts for about
September 2016, the company
$300 thousand in August 2015. In October 2017, Yahoo!
said that at least 500 million of
updated its assessment of
its accounts were hacked in
the hack, and stated that
2014 by what it believed was a
it believes all of its
state-sponsored actor.
3 billion accounts at the
time of the August 2013
In December 2016, it was
learned that an even bigger breach were affected.
breach took place in August
2013.
2015

2016
57 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 58
2013 In the wake of the Snowden
leaks, President Obama requests
$769 million to improve the
Department of Homeland
Former CIA employee and NSA contractor Edward Snowden leaks
Security's information security. 2
hundreds of thousands of documents from multiple confidential
national security programs. Included was PRISM, a program where
the NSA collected data with the assistance of Facebook, Google and
Microso.1 These leaks divided the United States and caused many to

A subject of
lose trust in the government.

controversy, Snowden
has been variously
called a hero,
a whistleblower, a
dissident, a patriot
and a traitor.

Sources
1 www.varonis.com/blog/events-that-changed-cyber-
security/ ; 2020
2 www.trumancenter.org/doctrine-blog/cyber-security-
in-the-wake-of-snowden/

59 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 60
CRYPTOWALL
CryptoWall ransomware first
appears. This malware targets
Windows PCs and eventually

2013
earns an estimated $325 million
Your private key will be
for cybercriminals.2
destroyed on:

Microso announces Sources 4/19/2014


an update to Office 365.1 Time le : 01:25:02

HTML45 An estimated 500


thousand unique
HTML5 replaces HTML4 as malware strains are
the standard web markup produced daily.3
language. HTML4 had been in
place since 1997.1

2014
Aackers breach systems
supporting a major hotel chain in

Place Bid
2014 and remain in the system. The
breach was not discovered until
September 2018, during which time
A cyberaack on the world’s largest the thieves stole data on nearly 500
auction website exposes the personal million customers.2
information, including name, address,
date of birth and encrypted password, of
all 145 million users.2
Sources:
1 www.computerhistory.org/timeline ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019
3 www.sentinelone.com/blog/history-of-cyber-security/ ; 2019

61 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 62
2014 Ironically, companies who
were running a version of

HEARTBLEED OpenSSL more than two


years old in April 2014

BUG were not affected by the


Heartbleed bug.
A flaw in the OpenSSL cryptographic library
known as the Heartbleed bug is discovered.
Almost 20% of web servers worldwide were
vulnerable to this bug, which allowed hackers
to spy on communications and steal usernames,
passwords, emails, instant messages and
confidential files. The Fixed OpenSSL library
largely reduced the effectiveness of this exploit.1
PERCENTAGE OF SITES AFFECTED, AND
PERCENTAGE WHO REQUIRED PATCHING 2

Affected Patched
100% Social Sites

83%
80%
Email Sites
Other Sites
60%
50% 50% 50%
Retail Sites
40% 40%
40%

25% 25%
20%

Sources:
0
1 www.computerhistory.org/timeline/ ; 2020
2 www.securityaffairs.co/wordpress/23878/intelligence/statistics-impact-heartbleed.html ; 2014

63 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 64
The
JANUARY 2015 AUGUST 2015
Accuvant and FishNet Security Optiv launches
complete their merger. This new branding, and
creates the nations largest begins conducting
comprehensive pure-play business as Optiv.
cybersecurity solutions provider

Optiv
with approximately 1,400
employees and a combined
revenue of $1.5 billion.

APRIL 2015
Accuvant and FishNet Security

Story
officially announce the new
JULY 2015
name - Optiv Security.
Optiv announces general
availability of proven security
JUNE 2015 program strategy services. This
Optiv ranks no.26 on The Channel be€er equips organizations to plan,
Company's 2015 CRN Solutions build and run business-aligned and
Provider 500. threat-aware security programs.

2015 2016

Optiv was able to offer a APRIL 2016


Optiv acquires identity and
JUNE 2016
Optiv acquires Adaptive

comprehensive suite of access management


provider Advancive.
Communications; expanding
their New England presence.

end-to-end solutions MAY 2016


SEPTEMBER 2016
across all phases of the Optiv purchases Evantix to
develop third-party risk
Optiv ranks on Inc.5000
fastest-growing private
cybersecuirty solution.
cybersecurity lifecycle companies list, becoming the
highest ranked cybersecurity
organization on the list.

65 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 66
2015
Hackers steal 4.2 million personnel
files of current and former
employees from the United States
Office of Personnel Management in
2015 one of the largest government
Lockerpin malware is discovered. breaches in the nation's history.
It is considered the first
ransomware able to permanently
lock Android smartphones or
tablets by rese ing a user's PIN.
Files included 21.5
million security
clearance background
investigations and 5.6
million fingerprints.
2015
A large insurance company reports a
breach of their systems in which the
personal information of 78.8 million
current and former customers is stolen.

(That’s roughly the population of 2015


California, Illinois, New York and A worldwide group of
Maryland combined.) cybercriminals hacks a database of
prepaid debit cards and uses the
data to steal $45 million from
ATMs around the world.

Sources:
1 www.cybersecurityventures.com/cybersecurity-ceo-the-histo-
ry-of-cybercrime-from-1834-to-present/ ; 2019
2 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020

67 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 68
2017
WANNACRY
WORM

1
01
0101
110101
01010101
0101101010
101010101010
1010101010101
0101111001010
101010101010
101010101
0101

The WannaCry worm infects over


230 thousand computers in more than
150 countries within 24 hours. It is the
largest ransomware offensive to date, and is
the first ransomware delivered by worm, a
self-replicating and distributing malware.
WannaCry targeted a vulnerability in older

DNC EMAIL HACK


2016

operating systems.2

Emails from the Democratic National Commi ee


are leaked to WikiLeaks in the run up to the 2016
United States presidential election. According to
the DNC, Russian intelligence group Cozy Bear
infiltrated the DNC network as far back as 2015,
nearly a year before the leaks of the pilfered
material began. A second Russian group - Fancy Sources:
1 www.cybersecurityven-
Bear, hacked the DNC’s systems in 2016. The DNC OPTIV HISTORY tures.com/cybersecuri-
wouldn’t notice the presence of either until April February 2017: Optiv completed a majority stake equity
ty-ceo-the-history-of-cyber-
crime-from-1834-to-present/
28, 2016, at which point it called in a security firm transaction with KKR, enabling acceleration of service and ; 2019
to help analyze and mitigate the damage.1 solutions capabilities and global expansion.
2 www.varonis.com/blog/
events-that-changed-cyber-
security/ ; 2020

69 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 70
BAD
How did this happen?
Initially hacked via a consumer
complaint web portal. A widely

CREDIT
known vulnerability that
should have been patched but,
due to failures in internal
processes, wasn't.2

The aackers moved to other


servers because the systems
weren't adequately segmented,
where they found plain text
usernames and passwords allowing
Data was pulled out of the access to further systems.2

2017
network undetected for
months because the credit
bureau failed to renew an
encryption certificate.2
The company did not
publicize the breach
until more than a month
aer they discovered it
had happened.2

One of the largest consumer credit bureaus is hacked, exposing


the data of 143 million users, including their Social Security
numbers, birth dates, addresses, driver's license numbers
and, in some cases, credit card numbers. This leads to the In Feburary of 2020, the United
resignation of their CEO.1 States Justice Department unsealed
indictments against four officers of

2020
the People's Liberation Army, a
Chinese state-sponsored group,
holding them responsible for the
largest state-sponsored theft of
Sources: personal information ever recorded.
1 www.varonis.com/blog/events-that-changed-cybersecurity/ ; 2020
2 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019

71 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 72
BUSTED
2019
Cisco Talos researchers discover 74
Facebook groups dedicated to cyber
OPTIV HISTORY
September 2018:
Optiv launches integrated
services portfolios.
crime, including the sale of stolen
credit card information and identities,
spam lists and hacking tools. Aer 2019
pressure from Cisco, Facebook deleted
these groups, though new ones The United States Federal Bureau of
continue to appear.1 Investigation (FBI) notifies Citrix that
cybercriminals had likely accessed the
company's internal network through the
use of "password spraying", a brute force
technique where hackers use common
passwords to a empt to access a large
3
number of employee accounts.1

2017
Taco Hack OPTIV HISTORY
Eastern European cybercriminals July 2019: Optiv establishes availability
use phishing techniques to steal of Advanced Fusion Center solutions
the credit card information of designed to enable organizations to
millions of Chipotle customers.1 accelerate cybersecurity maturity
and improve operational outcomes.

Sources:
1 www.cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/ ; 2019

73 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 74
6’

6’
75 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 76
It’s hard to talk about 2020
without mentioning the
Coronavirus Pandemic. 2/29/2020
First recorded COVID-19 death
in the US.6
6/1/2020
12/31/2019 1/21/2020 Colorado health officials
A pneumonia case of First reported case in the US.4 announce they expect a
unknown cause in Wuhan, 4/4/2020 bigger second wave of
China is reported to the WHO.1 COVID-19 case count Coronavirus than the first.
2/15/2020 tops 1 million.1
World Health Organization
1/9/2020 (WHO) Director General
First reported death calls on the international
from COVID-19.3 community to stand
together at the Munich
Security Conference5

1/7/2020 1/30/2020 3/11/2020 6/8/2020


Chinese researchers identify a COVID-19 outbreak is declared WHO declares COVID-19 New Zealand’s prime minister,
novel coronavirus, later a public health emergency of a Pandemic.1 Jacinda Ardern, says that
named COVID-19.2 international concern.1 government will liˆ all
COVID-19 restrictions except
border controls almost
immediately aˆer report of
1/13/2020 zero cases in the country.
First case of COVID-19 5/1/2020
Sources:
1 WHO Timeline - COVID-19
outside of China confirmed Macy's announces they will reopen 68
2 World Health Organization in Thailand.1 stores in states which have liˆed
3 New York Times
4 The New England Journal of Medicine restrictions. With state and local
5 WHO, Rolling updates on coronavirus disease (COVID-19)
6 CDC approval and improvement in
7 USA Today COVID-19 rates, they plan to reopen the
rest of their 775 stores by mid-June.7
77 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 78
Impacts of COVID-19
CYBERSECURITY

APRIL 30 CEOs, corporate board members, CISOs


MARCH 9 Several phishing and other executives have to make
Reason Labs researcher campaigns are discovered cybersecurity 'C-suite business' in order to
identifies a malicious APRIL 1 leveraging the Family ensure their companies secure what they
FEB 2,

2020
"Coronavirus map" app Microso warns hospitals and Medical Leave Act, have, while enabling continuous business
using AZORult to about the risks of small business disaster and operational change and keeping pace
Nation-State actors steal information ransomware a acks due relief funds and parcel with ever-changing threats in order to
reported to use and download to insecure VPN devices delivery services to identify and thwart would-be hackers and
COVID-themed lures.1 additional malware.3 and gateways.5 deliver malware.9 respond rapidly to malicious activity.
- General David Petraeus

APRIL 3
FEB 15 MARCH 20 MAY 6 MAY 13
CFOs plan to
Suspicious email FBI Internet Crime United States and The gap between
permanently shi
messages appearing Complaint Center warns United Kingdom cybersecurity risk and
significant numbers
to be from WHO of a rise in fraud due to security agencies defensive effectiveness is
of employees to
a empt to take COVID-19, including fake identify hacking as wide as it’s ever been for
remote work.6
advantage of the CDC emails, phishing campaigns by advanced most companies.11
COVID-19 emergency.2 a empts and counterfeit APRIL 7 persistent threats
treatments and Fake Zoom installers targeting healthcare MAY 13
equipment.4 being used to and medical Fraudsters use COVID-19 to
distribute malware researchers fighting target younger generations.12
are discovered.7 the coronavirus.10
Sources:
1 ZDNet APRIL 16 3 Business Insider
MAY 18
2 WHO, Rolling updates on coronavirus disease (COVID-19) 4 FBI.gov
5 Microsoft Google blocks 18 million 10 CISA The Global Cybersecurity Market
6 Forbes COVID-related malware 11 Forbes
Assessment for 2020 predicts growth
7 Bleeping Computer 12 Security Magazine
8 Talos Intelligence and phishing emails 13 Business Insider
deviations due to COVID-19 and places the
9 Securityintelligence.com
per day over the market at $230 Billion in 2021.13
previous week.8
79 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 80
Working “Home is the new enterprise” – Dave Dewalt

from Home
PREDICTION
OPTIV HISTORY Based on historical trends, employees
April 2020: Kevin Lynch who worked remotely before the
is named as CEO of Optiv pandemic will do so more often once
offices reopen. We also predict that
significant numbers of those who had
never worked remotely before the

Shift
pandemic will continue to work from
home in some capacity. We estimate
that 25-30% of the workforce will work
from home multiple days per week by

56% An estimated 56% of employees in the United


the end of 2021.

States are in a role that is at least somewhat


80 American’s Increasinly

2020
compatible with working remotely.
Working Remotely

3.6%
As of 2018, 3.6% of the United States
70

60 March 3-April 2
“A typical employer workforce, some 5 million people, work from
home half of the time or more. According to a
can save about
2016 Gallup poll, 43% of employees work from 50
$11 thousand/year for home at least some of the time. We predict
every person who that the longer people are required to work
works remotely half of from home, the more widespread its adoption 40
the time.” will be in the long term.
Kate Lister, President Of Global Workplace Analytics 30
March 13-15

Sources: 20
www.globalworkplaceanalytics.com/work-at-home-after-covid-19-our-forecast
www.news.gallup.com/poll/306695/workers-discovering-affinity-remote-work.aspx

10
81 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 82
Top Six 3 We may see the first cases of deepfakes being
used to manipulate stock prices.

Cybersecurity
Trends for 4 Election misinformation campaigns are
expected to proliferate.

2020
1 2 75-80% of the United States
workforce now works from
Apple’s much-talked-
about “privacy as a
5 Anticipate widespread realignment of IT and
security organizations.

6
home. Remote work increases human right” campaign
pressure on securing your should cause others to
environment. follow.

The basics are expected to continue vexing


consumers as well as enterprise organizations.

Sources:
www.optiv.com/explore-optiv-insights/blog/top-six-cybersecurity-trends-2020 ; 2019

83 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 84
THE PAST THE FUTURE
If the trajectory of our past indicates anything, EMAIL AND PHISHING MOBILE PHONES
it's that we can expect a wild ride ahead. The
rapid pace of innovation in threats, technologies ARTIFICIAL INTELLIGENCE (AI)
RANSOMWARE
and services have informed these predictions of
what we can expect in our near future.
THE CLOUD INTERNET OF THINGS (IOT)

85 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 86
You’ve 55%
More than

Got
of companies in 2019
fell victim to at least one
successful phishing aack.2
PREDICTION
Email will continue to be one of the

Mail
most aractive systems targeted

66%
by aackers through phishing and
other techniques to steal credentials,
implant malware and encourage wire
transfer fraud.
of malware is installed via
malicious email aachments3

Impacts of Successful
Phishing Aacks2
The very first email was
60% 40% 20%

250B
sent in 1971, today

LOSS OF DATA

CREDENTIAL ACCOUNT COMPROMISE


emails are sent each day1
RANSOMWARE INFECTION

OTHER MALWARE INFECTION

Sources:
Prediction written by J.D. Padgett FINANCIAL LOSS/WIRE TRANSFER FRAUD
1 www.atmail.com/blog/10-email-facts-to-impress/ ; 2018
2 Proofpoint 2020 State of the Phish Report ; 2020
3 www.varonis.com/blog/cybersecurity-statistics/ ; 2020

87 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 88
Ransomware:
Computing
PREDICTION #1:
It is a maer of time before aacks compromise our critical
infrastructure potentially holding entire regions of the
country hostage with energy outages. Just look at the

Gets Personal
impact to cities and towns when their local government
gets hit with ransomware.

PREDICTION #2:
There is currently no defense against deep fake videos and

Optiv Domains
people have shown a propensity to believe news that fits their
bias. Clearing your name aer a deep fake video has gone viral
on social media will be extremely difficult, if not impossible,
and in many cases the damage will have already been done. Plus,
you can never truly remove the deep fake video from the
Internet so you will need to defend yourself again and again in
the future. Since private companies control social media
platforms, the response to removing deep fake videos will be
inconsistent and change with the political landscape.

PREDICTION #3:
As technology becomes more and more embedded in medical
devices, human organs could be held for ransom. Imagine

B4.1 having to pay bitcoin to maintain the use of your next


generation hearing aid or worse, your insurance company
may disable the device until you pay your medical bill.

Sources:
Predictions written by Brian Wrozek, Optiv VP, Corporate Security, Risk and Compliance Management and Physical Security
1 www.census.gov/content/dam/Census/library/publications/2017/acs/acs-37.pdf ; 2015

89 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 90
On Cloud 60%
Workloads in
the Public Cloud2

Nine
2020

80% 99%
PREDICTION Through 2023, at least 2019

of critical enterprise applications of cloud security failures


will be hosted in the public cloud will be the customer’s fault.1
and continue to compound the
security challenge. 40%

2018

50% 24%
By 2021, Cloud assets were involved in

of enterprises will unknowingly of breaches in 2019, and the


and mistakenly have exposed some cloud breach involved a web
IaaS storage services, network segments, application server or email
applications or APIs directly to server 73% of the time.1
the public internet.1

Sources
1 www.theesa.com/esa-research/2019-essential-facts-about-the-computer-and-
20%
video-game-industry/ ; 2018
Sources:
2 www.cisomag.eccouncil.org/gaming-industry-suffered-12-billion-cyber-attacks-
Prediction written by Joe Vadakkan
in-past-17-months/ ; 2019
1 Gartner 5 Things You Must Absolutely Get Right for Secure IaaS and PaaS ; 2020
2 Flexera (Rightscale) State of the Cloud-Report from 2019 and 2020 ; 2020

91 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 92
It's
DID YOU KNOW?

Your mobile
phone has more
Your computing power
than the computers

Call used for the Apollo


11 moon landing.1
PREDICTION
Breaches that include mobile devices
in the a ack campaign will likely Mobile malware

22%
continue to increase. The user played a role in
interface for mobile devices oen
makes it more challenging to
identify phishing and mali-
cious links. In addition,
of external a acks
COVID has potentially
in 2019.2
forced a relaxation of
BYOD security policies
(but hopefully only
temporarily).

The first mobile phone

1973
call was made on April 3rd
Sources:
Prediction written by J.D. Padgett 3
1 www.factslides.com/s-Mobile-Phones ; 2017
2 Forrester Top Cybersecurity Threats in 2020 ; 2020
3 www.techcrunch.com/gallery/10-amazing-facts-you-probably-dont-know-about-mo-
.
bile-phones/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_re-
ferrer_sig=AQAAAFSivrbP3NvXJ6kEjGKF8OAQZB6r8UsW8vatcYAYc3Uwo_PXI_hyQTk4d-
CELmZMs2NUoigp_DX6Mb9bMpSb5pP-WLTA8ay4R_1_jX8GIrrB-6EhCg2x3HDSKI6D2aQ_jBnn-
QYI9m6k_0hMjDd4QpRqzFjlQ1cGjVhtI592BewQHP ; 2016

93 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 94
The Power AI CAN BE USED TO DEVELOP “ DEEPFAKES”
by using freely available video of public

of AI
figures or influencers and completely
altering the words being spoken in a
nearly imperceptible way.
Deepfakes will increasingly be
used by cyber criminals to steal
sensitive information,
PREDICTION convince victims to disburse
money to them, or
AI-enabled aacks will rise from the
manipulate public
#8 ranked threat today to the #4
perception around
ranked threat in just two years. 1
important issues.

AI can relieve
overburdened security
teams by automating MALWARE WILL BE INFUSED WITH AI
key steps of the threat smarts to adapt to best avoid detection,
and change its tactics real-time based on
prevention, detection the victim’s unique environment to

and response process. maximize its impact. AI-enabled malware


can start along one aack path then
determine a different trajectory would
create a higher probability of success.

52%

Breach costs for those


of companies have organizations with security
security automation automation fully deployed
at least partially were roughly 50% lower
deployed as of 20192 than those with no
Sources:
automation program2 Prediction written by J.D. Padgett
1 Optiv/ESI Security Executives Survey ; 2020
2 Ponemon Cost of a Data Breach Report ; 2019

95 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 96
These are a
few of my
50%
By 2024, at least

favorite IoTs of enterprise applications


in production will be
IoT-enabled.2

PREDICTION
Cyber losses related to connected IoT
devices will increase substantially to the
2nd most problematic component of IT
infrastructure contributing to cyber loss.
IoT is currently seen as the 11th.3

VROOM VROOM
The number of IoT units built into Automotive
and Enterprise solutions will more than double Sources:

over the next 5 years, from 5.8 billion in 2020 to Prediction written by J.D. Padgett
1 Gartner IoT Forecast as of July ; 2020
12.1 billion in 2025.1 2 Gartner Predicts 2019: IoT Will Drive Profound Changes to Your Core Business Applications and
IT Infrastructure ; 2018
3 Optiv/ESI Security Executives Survey ; 2020

97 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 98
WHY OPTIV?
SINGULAR FOCUS FLEXIBLE CYBERSECURITY
ON CYBERSECURITY MODELS
Our staff is comprised of skilled Our flexible cybersecurity
cybersecurity professionals who models are intended to help your
eat, sleep and breathe organization be er support
cybersecurity; providing you continuously evolving business
with unmatched insight and needs. We enable you to optimize
perspective, depth and breadth and rationalize existing
of services. cybersecurity programs so that
ical Integrat your organization can evolve in
chn io
Te n END-TO-END highly effective and integrated
INTEGRATION SECURITY CAPABILITIES ways, and transform how you are
ADVISORY
AND INNOVATION OPERATIONS We are a leading security procuring, consuming,
solutions integrator (SSI), digging integrating, implementing and
into your existing program, operationalizing cybersecurity.
identifying what is working and
PLAN BUILD RUN what’s duplicative, determining INSIDE-OUT APPROACH
us n what it takes to get your security

on
pe We start with the core
B

in e io ti
O

s s I n te g ra t ra t
i o n a l E xe c
u right and stubbornly effective, requirement of every enterprise –
and then executing with risk mitigation – and build out
precision. Aer we deliver from there with individually
solutions that work, we provide customized strategy,
the expertise and offerings to infrastructure, rationalization,
handle as li le or as much of the operations optimization and
ongoing management burden as ongoing measurement. This is
you want. how you, your organizational
leaders and your board can
BREADTH OF
reverse the toxic trends you face
EXPERIENCE
today and turn your security
Our solutions are designed to
operation inside-out.
address your specific business
objectives, and drive desired
positive outcomes.

99 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 100
OUR SERVICES

IDENTITY INTEGRATION
CYBER DIGITAL AND DATA RISK SECURITY THREAT AND
TRANSFORMATION MANAGEMENT MANAGEMENT OPERATIONS MANAGEMENT INNOVATION

As your trusted digital Rather than procuring Optiv’s Risk Management By integrating threat Optiv’s threat management Optiv’s Integration and
transformation (DX) and implementing siloed and Transformation intelligence, risk approach allows your Innovation services help
partner, Optiv aligns your solutions, Optiv helps you services align your management profiling, organization to identify break down security
business objectives with a integrate critical identity organization’s security orchestration and vulnerabilities and technology silos to
security-by-design and data management program with business automation tools, and malicious activity faster, maximize the effectiveness
approach, connecting agile (IDM) elements into a needs to reduce risk. We advanced and automated reduce threat actor dwell of your organization’s
processes and controls comprehensive, flexible are the only security analytics applied to time and build security current investments.
with emerging security and solution that is delivered solutions integrator that ongoing data capture, into your infrastructure These services help you
cloud technologies for a as-a-service, as a managed can guide you through an Optiv has changed and applications from the expand and custom-build
successful digital program. service, or on-premise. entire security journey, cybersecurity operations to start, enabling a stronger unique solutions to
We enable your Optiv’s strategic IDM from initial concept and be highly scalable, security posture. streamline business and
organization to achieve the programs allow you to design to program responsive and flexible to cybersecurity challenges.
flexibility you need to provide the right people management and your unpredictably shi ing
confidently secure, scale access to the right data – optimization, and support business needs.
and adapt to new emerging in the right manner – all points in between.
trends while delivering any maintaining trust and
DX initiative. compliance for your
business and your
customers.

101 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 102
REFERENCES

P5, www.ai.sri.com/shakey/; www.theconversation.com/how- P37, www.cybersecurityventures.com/cybersecurity-ceo-the-his- P69, www.cybersecurityventures.com/cybersecurity-ceo-the-his-


the-internet-was-born-from-the-arpanet-to-the-internet-68072 tory-of-cybercrime-from-1834-to-present/ tory-of-cybercrime-from-1834-to-present/ ; www.varonis.com/
; www.latrobe.edu.au/nest/fascinating-evolution-cybersecurity/ blog/events-that-changed-cybersecurity/
; www.digitaltrends.com/computing/cyberscurity-1970-me- P39, www.computerhistory.org/timeline/2004/ ; www.cyber-
mo-ware-report/ securityventures.com/cybersecurity-ceo-the-history-of-cyber- P71, www.varonis.com/blog/events-that-changed-cybersecurity/
crime-from-1834-to-present/ ; www.nasa.gov/feature/nasa- ; www.cybersecurityventures.com/cybersecurity-ceo-the-histo-
P7, www.tripwire.com/state-of-security/security-data-protection/ hacks-the-real-stories ry-of-cybercrime-from-1834-to-present/
cyber-security/the-evolution-of-hacking/ ; www.livescience.
com/20718-computer-history.html ; www.worldsciencefestival. P41, www.securityboulevard.com/2018/03/the-data-breach-epi- P73, www.cybersecurityventures.com/cybersecurity-ceo-the-his-
com/infographics/a_history_of_computer_science/ demic-no-info-is-safe/ ; www.cybersecurityventures.com/cyber- tory-of-cybercrime-from-1834-to-present/
security-market-report/ ; www.thebalance.com/u-s-federalbud-
P9, www.newyorker.com/magazine/2014/05/05/a-new-kind-of- get-breakdown-3305789 ; www.statista.com/statistics/737504/ P77, WHO Timeline - COVID-19 ; World Health Organization ;
spy ; www.technovelgy.com/ct/content.asp?Bnum=190 us-fed-gov-it-cyber-security-fy-budget/ New York Times ; The New England Journal of Medicine ; WHO,
Rolling updates on coronavirus disease (COVID-19) ; CDC ; USA
P13, www.computerhistory.org/timeline/1980/ ; www.gcn. P43, www.cybersecurityventures.com/cybersecurity-ceo-the-his- Today
com/Articles/2013/05/30/GCN30-Timeline-Cybersecurity. tory-of-cybercrime-from-1834-to-present/
aspx?Page=1http://gcn.com/Articles/2013/05/30/GCN30-Time- P79, ZDNet ; WHO, Rolling updates on coronavirus disease
line-Cybersecurity.aspx?Page=1 P45, www.computerhistory.org/timeline/ ; www.cyber- (COVID-19) ; Microsoft ; Forbes ; Bleeping Computer ; Talos
securityventures.com/cybersecurity-ceo-the-histo- Intelligence ; Securityintelligence.com ; Business Insider ; FBI.
P15, www.computerhistory.org/timeline/1984/ ; www.world- ry-of-cybercrime-from-1834-to-present/ ; www.gcn.com/ gov ; CISA ; Forbes ; Security Magazine ; Business Insider
sciencefestival.com/infographics/a_history_of_computer_sci- Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx-
ence/ ; www.washingtonpost.com/archive/politics/1989/08/17/ ?Page=1http://gcn.com/Articles/2013/05/30/GCN30-Time- P81, www.globalworkplaceanalytics.com/work-at-home-after-
computer-hackers-face-spy-charges/cad42e6b-73db-48d4-814f- line-Cybersecurity.aspx?Page=1 covid-19-our-forecast ; www.news.gallup.com/poll/306695/work-
86eb1574ae68/ ers-discovering-affinity-remote-work.aspx
P49, www.zdnet.com/article/a-decade-of-hacking-the-most-
P17, www.sentinelone.com/blog/history-of-cyber-security/ ; notable-cyber-security-events-of-the-2010s/ ; www.wired. P87, Prediction written by J.D. Padgett ; www.atmail.com/
www.captechu.edu/blog/cyber-security-impact-30th-anniversa- com/2014/11/countdown-to-zero-day-stuxnet/ ; www.cyber- blog/10-email-facts-to-impress/ ; Proofpoint 2020 State of the
ry-of-morris-worm securityventures.com/cybersecurity-ceo-the-history-of-cyber- Phish Report ; www.varonis.com/blog/cybersecurity-statistics/
crime-from-1834-to-present/ ; www.kaspersky.com/resource-cen-
P23, www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cy- ter/threats/zeus-virus P89, Predictions written by Brian Wrozek ; www.census.gov/
bersecurity.aspx?Page=1http://gcn.com/Articles/2013/05/30/ content/dam/Census/library/publications/2017/acs/acs-37.pdf
GCN30-Timeline-Cybersecurity.aspx?Page=1 ; www.cyberse- P51, www.zdnet.com/article/a-decade-of-hacking-the-most-
curityventures.com/cybersecurity-ceo-the-history-of-cyber- notable-cyber-security-eventsof-the-2010s/ ; cybersecu- P91, Prediction written by Joe Vadakkan ; Gartner 5 Things You
crime-from-1834-to-present/ rityventures.com/cybersecurity-ceo-the-history-of-cyber- Must Absolutely Get Right for Secure IaaS and PaaS ; Flexera
crime-from-1834-to-present/ (Rightscale) State of the Cloud-Report from 2019 and 2020
P25, www.cybersecurityventures.com/cybersecurity-ceo-the-his-
tory-of-cybercrime-from-1834-to-present/ ; www.pbs.org/wgbh/ P53, www.computerhistory.org/timeline/2011/ ; www. P93, Prediction written by J.D. Padgett ; www.factslides.com/s-
pages/frontline/shows/cyberwar/etc/faqs.html securitytoday.com/Articles/2020/01/13/The-IoT-Run- Mobile-Phones ; Forrester Top Cybersecurity Threats in 2020
down-for-2020.aspx?Page=2 ; www.forbes.com/sites/ ; www.techcrunch.com/gallery/10-amazing-facts-you-proba-
P27, www.informationsecuritybuzz.com/articles/digital-dan- louiscolumbus/2020/06/04/10-ways-enterprises-are-get- bly-dont-know-about-mobile-phones/?guccounter=1&guce_re-
gers-brief-history-computer-security-threats/ ; www.cnbc.com/ ting-results-from-ai-strategies/#606d8f386fdb ; www.opensource. ferrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_refer-
id/100000049 ; www. cybersecurityventures.com/cybersecuri- com/resources/raspberry-pi rer_sig=AQAAAFSivrbP3NvXJ6kEjGKF8OAQZB6r8UsW8vat-
ty-ceo-the-history-of-cybercrime-from-1834-to-present/ cYAYc3Uwo_PXI_hyQTk4dCELmZMs2NUoigp_DX6Mb9b-
P55, www.varonis.com/blog/events-that-changed-cybersecurity/ MpSb5pP-WLTA8ay4R_1_jX8GIrrB-6EhCg2x3HDSKI6D2aQ_jBn-
P29, www.cybersecurityventures.com/cybersecurity-ceo-the-his- nQYI9m6k_0hMjDd4QpRqzFjlQ1cGjVhtI592BewQHP
tory-of-cybercrime-from-1834-to-present/ ; www.cyberexperts. P59, www.varonis.com/blog/events-that-changed-cybersecurity/
com/history-of-cybersecurity/ ; www.trumancenter.org/doctrine-blog/cyber-securityin-the- P95, Prediction written by J.D. Padgett ; Optiv/ESI Security Exec-
wake-of-snowden/ utives Survey ; Ponemon Cost of a Data Breach Report
P33, www.cybersecurityventures.com/cybersecurity-ceo-the-his-
tory-of-cybercrime-from-1834-to-present/ ; www.gcn.com/ P61, www.computerhistory.org/timeline ; www.cybersecu- P97, Prediction written by J.D. Padgett ; Gartner IoT Forecast as
Articles/2013/05/30/GCN30-Timeline-Cybersecurity.aspx? ; www. rityventures.com/cybersecurity-ceo-the-history-of-cyber- of July ; Gartner Predicts 2019: IoT Will Drive Profound Changes
welcomewildlife.com/all-about-earthworms/#:~:text=Earth- crime-from-1834-to-present/ ; www.sentinelone.com/blog/ to Your Core Business Applications and IT Infrastructure ; Optiv/
worms%20vary%20widely%20in%20size,feet%20(3%20m)%20 history-of-cyber-security/ ESI Security Executives Survey
long! ; www.computerhistory.org/timeline/2000/ ; www.pbs.org/
wgbh/pages/frontline/shows/cyberwar/etc/faqs.html P63, www.computerhistory.org/timeline/ ; www.securityaffairs.co/
wordpress/23878/intelligence/statistics-impact-heartbleed.html
P35, www.caida.org/research/security/code-red/#background
; www.sans.org/reading-room/whitepapers/dlp/paper/87#:~:- P67, www.cybersecurityventures.com/cybersecurity-ceo-the-his-
text=The%20Code%20Red%20worm’s%20costs,were%20 tory-of-cybercrime-from-1834-to-present/ ; www.varonis.com/
infected%20by%20Code%20Red. ; www.computerhistory.org/ blog/events-that-changed-cybersecurity/
timeline/2001/ ; www.cybersecurityventures.com/cybersecuri-
ty-ceo-the-history-of-cybercrime-from-1834-to-present/

103 A Visual History of Cybersecurity INTRODUCTION 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 104
THANK YOU
Designed by the
Optiv Creative Team
Jeanne Bacque
Rachel Briggs
Melina Chastain
Rafael Encarnacion
Joel Hawkins
Mike Hill
Joel Jackson
Kaitlan Kelly
Martha LeBlanc
Matthew Watkins

Research by
Jeanne Bacque
Rachel Briggs
Melina Chastain
Rafael Encarnacion
Joel Hawkins
Mike Hill
Joel Jackson
Kaitlan Kelly
Martha LeBlanc
J.D. Padgett
Matthew Watkins
Brian Wrozek

Editing by
Jeanne Bacque
Michael Clark
J.D. Padgett
Alex Safransky
Optiv Global Headquarters
Project Management by 1144 15th Street, Suite 2900
Jeanne Bacque Denver, CO 80202
Rachel Briggs
Charleigh Loder
800.574.0896 | optiv.com

Who secures your security?™


Optiv is a security solutions integrator – a “one-stop” trusted partner with a singular focus on
cybersecurity. Our end-to-end cybersecurity capabilities span risk management and transfor-
mation, cyber digital transformation, threat management, security operations, identity and data
management, and integration and innovation, helping organizations realize stronger, simpler
and more cost efficient cybersecurity programs that support business requirements and out-
comes. At Optiv, we are modernizing cybersecurity to enable clients to innovate their consump-
tion models, integrate infrastructure and technology to maximize value, achieve measurable
outcomes, and realize complete solutions and business alignment. For more information about
Optiv, please visit us at www.optiv.com.
©2020 Optiv Security Inc. All Rights Reserved.

7.20 | RB | 1

You might also like