With online data breaches and threats on the rise, it's important to understand prevention strategies. At UMGC, we teach our students to think like hackers. Learn about risk management in cloud computing with Patrick Appiah-Kubi.
Transcript
VIDEO | AUDIO |
Intro Title Graphic  RISK MANAGEMENT IN CLOUD COMPUTING ON CAMERA Lower third title: Dr. Patrick Appiah-Kubi  Program Director, Cloud Computing Cybersecurity Department, UMGC Headlines Insurance Journal: 10 Cyberattacks in 2021 Cost $600M with 40,000 Businesses Put at Risk Forbes: Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats Healthcare IT News: Healthcare data breaches on the rise Fortune: The number of data breaches in 2021 has already surpassed last year’s total Buzz: Prevention is better than cure: the Ransomware Evolution ESPN: San Francisco 49ers’ network hit by gang’s ransomware attack; team notifies law enforcement | (music) ON CAMERA: I am Patrick Appiah-Kubi and I teach cloud computing at ¶¶ÒõÊÓƵ. Appiah-Kubi: If you’re like me, you’ve been paying attention to the increased reports of data breaches and ransomware. Cyber hackers are very smart. |
Images of hackers, companies moving data to the cloud | Appiah-Kubi: At the beginning of the pandemic, they noticed that companies were rapidly moving data to the cloud and suspected, rightly so, that many of them did not have a strategy to manage risks. |
Continue high tech computer images. Add text: 300% | Appiah-Kubi: Stealing data increased 300% since the start of the pandemic because hackers do what they do best, they look for loopholes and use them. |
ON CAMERA Images and text (underlined) that corresponds to the narration TRANSPORTATION, FINANCIAL INSTITUTIONS, GOVERNMENT AGENCIES, UNIVERSITIES, HEALTH CARE Â CU eyes | Appiah-Kubi: There is not a significant aspect of our daily lives that would not be affected by a cyber-attack. Transportation, financial institutions, government agencies, universities, health care. If you are connected to the Internet, your information is not secure. |
ON CAMERA Images of health care providers looking at X-rays Patient’s BP monitor with surgery in background Family member wearing mask holds patient’s hand | Appiah-Kubi: For example, eight months into the pandemic, medical records at a California hospital were stolen and ransom was demanded to return the records. This was very serious. Medical devices couldn’t communicate with each other. Patients were on life support and their doctors needed the data. |
ON CAMERA w/lower third title  Headlines in background:  GOV INFO SECURITY: Maryland Health Department Confirms Attack was Ransomware CNN politics: Cybersecurity incident prevents Maryland Health Department from publishing Covid-19 case data Photo of man in car receiving Covid test | Appiah-Kubi: More recently, a cyber-attack against the Maryland State Department of Health shut down their ability to report Covid numbers to the public. But the system was up and running within a few weeks, without the need to pay a ransom. |
On Camera Text over close ups of workers & satellite hovering over Earth, Zoom meeting INCREASES PRODUCTIVITY, INCREASES INNOVATION, INCREASES AGILITY,  INCREASES RESILIENCY, SAVES MONEY SPIN-OFF SERVICES  EXPAND OPERATIONS  IMPROVE COMMUNICATIONS | Appiah-Kubi: So why are companies willing to take the risk and move to the cloud?  Appiah-Kubi: It increases their productivity, innovation, agility, and resiliency … and saves money. They can more easily spin off services and expand their operations to other parts of the globe… and they can better communicate with their staff.  |
On Camera Text (underlined) over images  DEVELOP BASELINE - City with cyber-like grid HIRE ETHICAL HACKERS – hands on keyboard OUTSOURCE TO EXPERTS - Group of IT specialists at work | Appiah-Kubi: What can companies do? They can develop a baseline security approach before they migrate to the cloud. They can hire ethical hackers who test the company’s security. And they can outsource to experts. |
On Camera  VO: Visuals of UMGC Cyber competition with text: ZERO TRUST POLICY NETWORK SEGREGATION HOW TO CREATE TRUST ZONES INFRASTRUCTURE MANAGEMENT TECHNIQUES Lower third: Award-winning UMGC Cyber team | Appiah-Kubi: At UMGC, we teach our students to think like hackers…  Appiah-Kubi: to understand prevention and migration strategies like Zero trust policy, network segregation, how to create trust zones and proper infrastructure management techniques. |
On Camera with Patrick’s lower third title Dissolve to UMGC ANIMATED LOGO URL: umgc.edu/requestinfo | Appiah-Kubi: Our students simulate risk management scenarios and come up with solutions - every day in our classes, at ¶¶ÒõÊÓƵ. (Music ends) |
Share This