Emerging Risk Topics

Posted on 2011-04-27
Last Modified: 2012-05-11
We have been asked to put forward some suggestions on “interesting” IT presentations that would be classed as emerging topics – i.e. advances/new technologies in IT that need to be addressed from a risk angle / security perspective. The target audience will be security/audit/risk professionals.

Has anyone any suggestions or topics you would like to here about if you were invited to a risk/security seminar (needs to be relatively technical but not overly). I though about risks associated with cloud computing / virtualization as they are still relatively new concepts in some businesses, but could do with a list of about 5. It doesn’t have to just be security but any new (last 5 year or so) interesting risk based topics on new emerging IT issues that you are aware of?

So, any emerging issues that would be of interest to security/network/risk professionals that you can think of? And namely the issues that security/risk professionals face with these emerging issues/technologies/arrangements?
Question by:pma111
    LVL 5

    Accepted Solution

    One major risk is social engineering with regarding to the new social networks Facebook, Twitter etc.
    Social engineering is when manipulating people into performing actions and disclosing confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. Social Engineering has also been employed by bill collectors, skiptracers, and bounty hunters.

    "Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

    A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.


    LVL 62

    Assisted Solution

    by:☠ MASQ ☠

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    794 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now