With online data breaches and threats on the rise, it's important to understand prevention strategies. At t 黑料社区, we teach our students to think like hackers. Learn about risk management in cloud computing with Patrick Appiah-Kubi.

Transcript

VIDEOAUDIO
Intro Title Graphic 聽
RISK MANAGEMENT IN CLOUD COMPUTING

ON CAMERA
Lower third title: Dr. Patrick Appiah-Kubi 聽
Program Director, Cloud Computing Cybersecurity Department, UMGC

Headlines
Insurance Journal: 10 Cyberattacks in 2021 Cost $600M with 40,000 Businesses Put at Risk

Forbes: Cybersecurity in 2022 鈥 A Fresh Look at Some Very Alarming Stats

Healthcare IT News: Healthcare data breaches on the rise

Fortune: The number of data breaches in 2021 has already surpassed last year鈥檚 total

Buzz: Prevention is better than cure: the Ransomware Evolution

ESPN: San Francisco 49ers鈥 network hit by gang鈥檚 ransomware attack; team notifies law enforcement
(music)

ON CAMERA: I am Patrick Appiah-Kubi and I teach cloud computing at University of Maryland Global Campus.

Appiah-Kubi: If you鈥檙e like me, you鈥檝e been paying attention to the increased reports of data breaches and ransomware. Cyber hackers are very smart.
Images of hackers, companies moving data to the cloudAppiah-Kubi: At the beginning of the pandemic, they noticed that companies were rapidly moving data to the cloud and suspected, rightly so, that many of them did not have a strategy to manage risks.
Continue high tech computer images.
Add text: 300%
Appiah-Kubi: Stealing data increased 300% since the start of the pandemic because hackers do what they do best, they look for loopholes and use them.
ON CAMERA

Images and text (underlined) that corresponds to the narration
TRANSPORTATION, FINANCIAL INSTITUTIONS, GOVERNMENT AGENCIES, UNIVERSITIES, HEALTH CARE 聽

CU eyes
Appiah-Kubi: There is not a significant aspect of our daily lives that would not be affected by a cyber-attack.

Transportation, financial institutions, government agencies, universities, health care.

If you are connected to the Internet, your information is not secure.
ON CAMERA
Images of health care providers looking at X-rays

Patient鈥檚 BP monitor with surgery in background

Family member wearing mask holds patient鈥檚 hand聽
Appiah-Kubi: For example, eight months into the pandemic, medical records at a California hospital were stolen and ransom was demanded to return the records.

This was very serious. Medical devices couldn鈥檛 communicate with each other. Patients were on life support and their doctors needed the data.
ON CAMERA w/lower third title 聽

Headlines in background: 聽

GOV INFO SECURITY: Maryland Health Department Confirms Attack was Ransomware

CNN politics: Cybersecurity incident prevents Maryland Health Department from publishing Covid-19 case data

Photo of man in car receiving Covid test
Appiah-Kubi: More recently, a cyber-attack against the Maryland State Department of Health shut down their ability to report Covid numbers to the public. But the system was up and running within a few weeks, without the need to pay a ransom.
On Camera

Text over close ups of workers & satellite hovering over Earth, Zoom meeting

INCREASES PRODUCTIVITY, INCREASES INNOVATION, INCREASES AGILITY, 聽

INCREASES RESILIENCY, SAVES MONEY

SPIN-OFF SERVICES 聽

EXPAND OPERATIONS 聽

IMPROVE COMMUNICATIONS
Appiah-Kubi: So why are companies willing to take the risk and move to the cloud? 聽

Appiah-Kubi: It increases their productivity, innovation, agility, and resiliency 鈥 and saves money. They can more easily spin off services and expand their operations to other parts of the globe鈥 and they can better communicate with their staff.聽聽
On Camera

Text (underlined) over images 聽

DEVELOP BASELINE - City with cyber-like grid

HIRE ETHICAL HACKERS 鈥 hands on keyboard

OUTSOURCE TO EXPERTS - Group of IT specialists at work
Appiah-Kubi: What can companies do? They can develop a baseline security approach before they migrate to the cloud. They can hire ethical hackers who test the company鈥檚 security. And they can outsource to experts.
On Camera 聽

VO: Visuals of UMGC Cyber competition with text:

ZERO TRUST POLICY

NETWORK SEGREGATION

HOW TO CREATE TRUST ZONES

INFRASTRUCTURE MANAGEMENT TECHNIQUES

Lower third: Award-winning UMGC Cyber team
Appiah-Kubi: At t 黑料社区, we teach our students to think like hackers鈥 聽

Appiah-Kubi: to understand prevention and migration strategies like Zero trust policy, network segregation, how to create trust zones and proper infrastructure management techniques.
On Camera with Patrick鈥檚 lower third title

Dissolve to

UMGC ANIMATED LOGO

URL: umgc.edu/requestinfo
Appiah-Kubi: Our students simulate risk management scenarios and come up with solutions - every day in our classes, at University of Maryland Global Campus.

(Music ends)