Download presentation
Presentation is loading. Please wait.
Published byDoreen Curtis Modified over 9 years ago
1
Cyber Threat Matrix Version 2.4
2
James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia Southern University 14 years experience in information technology and security management
5
Crime War Activism / Command & Control / Propaganda
6
CRIME Three catalysts Lack of law or order Financially & technologically connected Bright, educated & dissatisfied labor Present: Russia Future: Egypt maybe, Africa, definately
7
Current Internet “backbone”
8
Under Construction
10
War, C4I 1 st world great powers (US, GER, JAP) Rising powers (China, India) Middleweight class (Isreal)
11
Activism, C4I, Propaganda Mexico / cartel war Stateless actors (Al Qaeda, Wikileaks, Anonymous) Non-state actors: causes, organization, revolutionaries, terrorists (amnesty international, civil rights movement, green revolution, ISIS) Anyone needing asymmetric force multiplication
12
www.bluereefgroup.com 105 River Hills Lane, Macon, GA 31211 USA +1.478.227.8043 Cyber Security Strategies for the Global Business Environment
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.