Emerging Risk Topics

We have been asked to put forward some suggestions on “interesting” IT presentations that would be classed as emerging topics – i.e. advances/new technologies in IT that need to be addressed from a risk angle / security perspective. The target audience will be security/audit/risk professionals.

Has anyone any suggestions or topics you would like to here about if you were invited to a risk/security seminar (needs to be relatively technical but not overly). I though about risks associated with cloud computing / virtualization as they are still relatively new concepts in some businesses, but could do with a list of about 5. It doesn’t have to just be security but any new (last 5 year or so) interesting risk based topics on new emerging IT issues that you are aware of?

So, any emerging issues that would be of interest to security/network/risk professionals that you can think of? And namely the issues that security/risk professionals face with these emerging issues/technologies/arrangements?
LVL 4
pma111Asked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

zazagorCommented:
Hi,
 
One major risk is social engineering with regarding to the new social networks Facebook, Twitter etc.
Social engineering is when manipulating people into performing actions and disclosing confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. Social Engineering has also been employed by bill collectors, skiptracers, and bounty hunters.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.

REFERENCE: http://en.wikipedia.org/wiki/Social_engineering_(security)

//zazagor

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Security

From novice to tech pro — start learning today.