ºÚÁÏÉçÇø

Skip Navigation
Skip to Menu Toggle Button

Risk Management in Cloud Computing Video

With online data breaches and threats on the rise, it's important to understand prevention strategies. At t ºÚÁÏÉçÇø, we teach our students to think like hackers. Learn about risk management in cloud computing with Patrick Appiah-Kubi.

Transcript

VIDEOAUDIO
Intro Title Graphic  
RISK MANAGEMENT IN CLOUD COMPUTING

ON CAMERA
Lower third title: Dr. Patrick Appiah-Kubi  
Program Director, Cloud Computing Cybersecurity Department, UMGC

Headlines
Insurance Journal: 10 Cyberattacks in 2021 Cost $600M with 40,000 Businesses Put at Risk

Forbes: Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats

Healthcare IT News: Healthcare data breaches on the rise

Fortune: The number of data breaches in 2021 has already surpassed last year’s total

Buzz: Prevention is better than cure: the Ransomware Evolution

ESPN: San Francisco 49ers’ network hit by gang’s ransomware attack; team notifies law enforcement
(music)

ON CAMERA: I am Patrick Appiah-Kubi and I teach cloud computing at University of Maryland Global Campus.

Appiah-Kubi: If you’re like me, you’ve been paying attention to the increased reports of data breaches and ransomware. Cyber hackers are very smart.
Images of hackers, companies moving data to the cloudAppiah-Kubi: At the beginning of the pandemic, they noticed that companies were rapidly moving data to the cloud and suspected, rightly so, that many of them did not have a strategy to manage risks.
Continue high tech computer images.
Add text: 300%
Appiah-Kubi: Stealing data increased 300% since the start of the pandemic because hackers do what they do best, they look for loopholes and use them.
ON CAMERA

Images and text (underlined) that corresponds to the narration
TRANSPORTATION, FINANCIAL INSTITUTIONS, GOVERNMENT AGENCIES, UNIVERSITIES, HEALTH CARE  

CU eyes
Appiah-Kubi: There is not a significant aspect of our daily lives that would not be affected by a cyber-attack.

Transportation, financial institutions, government agencies, universities, health care.

If you are connected to the Internet, your information is not secure.
ON CAMERA
Images of health care providers looking at X-rays

Patient’s BP monitor with surgery in background

Family member wearing mask holds patient’s hand 
Appiah-Kubi: For example, eight months into the pandemic, medical records at a California hospital were stolen and ransom was demanded to return the records.

This was very serious. Medical devices couldn’t communicate with each other. Patients were on life support and their doctors needed the data.
ON CAMERA w/lower third title  

Headlines in background:  

GOV INFO SECURITY: Maryland Health Department Confirms Attack was Ransomware

CNN politics: Cybersecurity incident prevents Maryland Health Department from publishing Covid-19 case data

Photo of man in car receiving Covid test
Appiah-Kubi: More recently, a cyber-attack against the Maryland State Department of Health shut down their ability to report Covid numbers to the public. But the system was up and running within a few weeks, without the need to pay a ransom.
On Camera

Text over close ups of workers & satellite hovering over Earth, Zoom meeting

INCREASES PRODUCTIVITY, INCREASES INNOVATION, INCREASES AGILITY,  

INCREASES RESILIENCY, SAVES MONEY

SPIN-OFF SERVICES  

EXPAND OPERATIONS  

IMPROVE COMMUNICATIONS
Appiah-Kubi: So why are companies willing to take the risk and move to the cloud?  

Appiah-Kubi: It increases their productivity, innovation, agility, and resiliency … and saves money. They can more easily spin off services and expand their operations to other parts of the globe… and they can better communicate with their staff.  
On Camera

Text (underlined) over images  

DEVELOP BASELINE - City with cyber-like grid

HIRE ETHICAL HACKERS – hands on keyboard

OUTSOURCE TO EXPERTS - Group of IT specialists at work
Appiah-Kubi: What can companies do? They can develop a baseline security approach before they migrate to the cloud. They can hire ethical hackers who test the company’s security. And they can outsource to experts.
On Camera  

VO: Visuals of UMGC Cyber competition with text:

ZERO TRUST POLICY

NETWORK SEGREGATION

HOW TO CREATE TRUST ZONES

INFRASTRUCTURE MANAGEMENT TECHNIQUES

Lower third: Award-winning UMGC Cyber team
Appiah-Kubi: At t ºÚÁÏÉçÇø, we teach our students to think like hackers…  

Appiah-Kubi: to understand prevention and migration strategies like Zero trust policy, network segregation, how to create trust zones and proper infrastructure management techniques.
On Camera with Patrick’s lower third title

Dissolve to

UMGC ANIMATED LOGO

URL: umgc.edu/requestinfo
Appiah-Kubi: Our students simulate risk management scenarios and come up with solutions - every day in our classes, at University of Maryland Global Campus.

(Music ends)