![Page 1: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/1.jpg)
.
.
McAfee Labs
What’s in store? Cyber threats in 2016 and beyond January 20, 2016
![Page 2: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/2.jpg)
.
2
Agenda
McAfee LabsWhat’s in store? Cyber threats in 2016 and beyond
Panelist introductions
2016 predictions overview
Top 2016 predictions
• Hardware – Matthew Rosenquist
• Ransomware – Christiaan Beek
• Wearables – Bruce Snell
• Automobiles – Matthew Rosenquist
• Critical infrastructure – Raj Samani
• Sharing threat intelligence – Jeannette Jarvis
Looking beyond 2016
Q&A
Wrap up
![Page 3: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/3.jpg)
.
3
Panelists
Raj Samani (moderator)CTO for Europe, Middle East, and AfricaIntel Security
Christiaan BeekDirector of Threat IntelligenceIntel Security
Bruce SnellSecurity and Privacy DirectorIntel Security
Matthew RosenquistCybersecurity Strategist and Evangelist Intel
Jeannette JarvisDirector Product ManagementIntel Security
![Page 4: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/4.jpg)
.
4
McAfee Labs 2016 Threats PredictionsHardware
Ransomware
Vulnerabilities
Payment systems
Attacks through employee systems
Cloud services
Wearables
Intel Security: A Five-Year Look Ahead
www.mcafee.com/2016threatspredictions
Automobiles
Warehouses of stolen data
Integrity
Cyber espionage
Hacktivism
Critical infrastructure
Sharing threat intelligence
![Page 5: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/5.jpg)
.
2016 Threats Predictions
![Page 6: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/6.jpg)
.
Attacks on all types of hardware and firmware will continue. The market for hardware attack tools will expand. VMs will be successfully attacked through system firmware rootkits.
Hardware
Equation Group – HDD and SSD firmware reprogramming malware
First commercial UEFI Rootkit
![Page 7: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/7.jpg)
.
Ransomware will remain a major and rapidly growing threat in 2016, fueled by anonymizing networks and payment methods.
Inexperienced cybercriminals will leverage ransomware-as-a-service, magnifying the growth in ransomware.
Ransomware
![Page 8: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/8.jpg)
.
Wearables will be a prime target for cyber criminals because they collect personal data and they are relatively insecure back doors into smartphones.
Wearables
Wearables Attack Surfaces
![Page 9: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/9.jpg)
.
Attacks on automobiles will increase rapidly in 2016 due to the rapid increase in connected automobile hardware built without foundational security principles.
Automobiles
Automobile Attack Surfaces
![Page 10: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/10.jpg)
.
Critical infrastructure systems not designed with outside access in mind will become vulnerable to low-incident, but high-impact events as they become connected to the Internet.
Critical infrastructure
![Page 11: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/11.jpg)
.
Threat intelligence sharing among enterprises and security vendors will grow rapidly.
Sharing threat intelligence
Legislative steps will make it possible to share threat intelligence with government.
We will see an acceleration in the development of best practices for sharing emerging threat information.
Threat intelligence cooperatives between industry vendors will expand. STIX/TAXII will be the standard by which they share information.
Metrics for success will emerge, allowing enterprises, security vendors, and governments to quantify protection improvement.
![Page 12: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/12.jpg)
.
Looking Beyond 2016
![Page 13: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/13.jpg)
.
13
Q&A
McAfee Labs 2016 Threats PredictionsHardware
Ransomware
Vulnerabilities
Payment systems
Attacks through employee systems
Cloud services
Wearables
www.mcafee.com/2016threatspredictions
Automobiles
Warehouses of stolen data
Integrity
Cyber espionage
Hacktivism
Critical infrastructure
Sharing threat intelligence
McAfee Labs @McAfee_LabsRaj Samani @Raj_SamaniChristiaan Beek @ChristiaanBeekMatthew Rosenquist @Matt_RosenquistJeannette Jarvis @jarvisjBruce Snell @brucesnell
Continue the conversation! Tweet to #cybersec
![Page 14: What’s in store? Cyber threats in 2016 and beyond](https://reader033.vdocuments.net/reader033/viewer/2022042907/5871543f1a28ab8e5b8b4cd9/html5/thumbnails/14.jpg)
.