Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean?

Every year the number and scale of cyberattacks grows. Marc Goodman, a global security strategist, futurist, and author of the book, Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It, thinks a lot about how we got here and what it means, which is why he was invited to be the first guest on my podcast series, Afternoon Cyber Tea with Ann Johnson.

Marc has a long history in law enforcement, starting as a police officer in Los Angeles and more recently as a consultant to Interpol, The United Nations, NATO, the U.S. Federal Government, and local U.S. law enforcement. His background and experience give him a shrewd perspective on the threats that governments and businesses face now and in the future.

In our conversation, Marc and I discussed what drives cyberattack numbers to climb every year and why data is a risk factor. We also peered into the future and examined some of the threats that businesses and governments should begin preparing for now. Did you know that today the average household has at least 15 connected devices? That number is expected to rapidly grow to 50. We talked about what a truly connected world means for defenders. I really appreciate the way Marc was able to humanize the risks associated with the Internet of Things (IoT).

Most importantly we identified steps, such as Multi-Factor Authentication (MFA) and passwordless technology, that organizations can take to mitigate these threats. I hope you will take a moment to listen in on our conversation. Listen to the first episode of Afternoon Cyber Tea with Ann Johnson on Apple Podcasts or Podcast One.

What’s next

In this important cyber series, I’ll talk with cybersecurity influencers about trends shaping the threat landscape and explore the risk and promise of systems powered by artificial intelligence (AI), IoT, and other emerging tech.

You can listen to Afternoon Cyber Tea with Ann Johnson on:

  • Apple Podcasts—You can also download the episode by clicking the Episode Website link.
  • Podcast One—Includes option to subscribe, so you’re notified as soon as new episodes are available.
  • CISO Spotlight page—Listen alongside our CISO Spotlight episodes where customers and security experts discuss similar topics such as Zero Trust, compliance, going passwordless, and more.

Also bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity. Or reach out to me on LinkedIn or Twitter if you have guest or topic suggestions.

READ MORE HERE