SlideShare une entreprise Scribd logo
1  sur  25
Windows of Opportunity in
Hallways of Distractions:
the race between threats,
security, and
collective intelligence
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
Board of Regents
Agenda
• Emerging Threats
• Emerging
Opportunities
• Call to Action
Now
3,300 mile Private Cloud
Virtual Library
Software Store
Enterprise Security and ePrivacy
Distance Education Learning Management
Enterprise Financials Enterprise BI
Library Operations
Student Information
Collaboration
PREMISE 1: GROWING THREAT
Emerging Threats
(on a scale of 1 to 10)
10 United States,
United
Kingdom, Russia
7 China
3 Iran
Can You Defend Against
100,000 Professionally
Trained Hackers?
Consider Mandiant Report on AG1
• Believed to be People Liberation Army Unit 61398.
• State sponsored, state funded, state secret.
• Since 2006, they have compromised 141 companies
spanning 20 major industries.
• Maintained access for an average of 356 days. Longest
measured access was 1,764 days.
Focus on Nation States
If a nation state wants
to break into your system,
will they?
Since it is Monday, here is a hint, the
answer is NO……
What to Do?
PREMISE 2: WHAT IS THE TRUTH?
First Rule of the Internet
Agreement does not scale
Implications
• Rootkits for “truth”
• Denial of truth attacks
• Zombie armies of disinformation?
Quiz
• Question: What happens if you Google a
system error?
• Answer: Nation states run a site that provides
guidance on answering a system error while
attacking your computer.
PREMISE 3: TIS THE BEST OF TIMES
AND THE WORST OF TIMES
Normal Distribution Curve
Effect of the WWW on the Normal
Curve of Behavior?
It is the best of times,
for morons and geniuses alike.
How are Humans
Going to Become Extinct?
• Pandemic?
• Global Warming?
• Asteroids?
• Nuclear War?
• Lord Rees, the
Astronomer Royal and
former president of the
Royal Society, is backing
plans for a Centre for the
Study of Existential Risk.
• "This is the first century in
the world's history when
the biggest threat is from
humanity," says Lord
Rees.
Quick Recap
We live in a world of growing threats where a
battle for the truth rages conducted by morons
and geniuses alike, operating from safe havens
created by a flattening of the norms of human
behavior which threaten the very existence of
mankind….
[run-on but
very depressing sentence continues]
Emerging Opportunities
Well, we have the geniuses….
6.8 billion people….
5.1 own cell phones….
4.1 own toothbrushes….
Knowledge Worker
Capacity
Shared
Governance
Technology
Data
Quality
Business
Intel
Real-Time
Data
LocationSocial
Privacy
Global
GTA
DOE
USG
TCSG
Revenue
DOAS
Data Classification
Response
Data Sharing
Action Learning
Get Agile
Get Big
Think Big
Think Mobile
Questions, Comments, a
Conversation
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
Board of Regents

Contenu connexe

Tendances

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 

Tendances (17)

Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
Rage Of The Kittens
Rage Of The KittensRage Of The Kittens
Rage Of The Kittens
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 

En vedette

Defining Value & Building Business Models
Defining Value & Building Business ModelsDefining Value & Building Business Models
Defining Value & Building Business Models
Bedaya Program / PICTI
 
Icmi discussant presentation
Icmi discussant presentationIcmi discussant presentation
Icmi discussant presentation
Magnus Johansson
 
Power point blogging for business Week 1
Power point blogging for business Week 1Power point blogging for business Week 1
Power point blogging for business Week 1
KeithChicago
 
Accidentes, enfermedades, tratamientos: Presentacion de vocabulario
Accidentes, enfermedades, tratamientos: Presentacion de vocabularioAccidentes, enfermedades, tratamientos: Presentacion de vocabulario
Accidentes, enfermedades, tratamientos: Presentacion de vocabulario
levanshhs
 
17 Terrific Self Motivating Tips
17 Terrific Self Motivating Tips17 Terrific Self Motivating Tips
17 Terrific Self Motivating Tips
leeza21
 
fire fighting certificate
fire fighting certificatefire fighting certificate
fire fighting certificate
yasser farag
 

En vedette (17)

Fallecimiento p. mariano cuesta rodriguez 16 enero 2016
Fallecimiento p. mariano cuesta rodriguez 16 enero 2016Fallecimiento p. mariano cuesta rodriguez 16 enero 2016
Fallecimiento p. mariano cuesta rodriguez 16 enero 2016
 
Defining Value & Building Business Models
Defining Value & Building Business ModelsDefining Value & Building Business Models
Defining Value & Building Business Models
 
Passion
PassionPassion
Passion
 
Icmi discussant presentation
Icmi discussant presentationIcmi discussant presentation
Icmi discussant presentation
 
Practica 8
Practica 8Practica 8
Practica 8
 
Naresh Cherukuri_CV_May-2016
Naresh Cherukuri_CV_May-2016Naresh Cherukuri_CV_May-2016
Naresh Cherukuri_CV_May-2016
 
Evaluación
EvaluaciónEvaluación
Evaluación
 
Power point blogging for business Week 1
Power point blogging for business Week 1Power point blogging for business Week 1
Power point blogging for business Week 1
 
Folletofinal
FolletofinalFolletofinal
Folletofinal
 
Accidentes, enfermedades, tratamientos: Presentacion de vocabulario
Accidentes, enfermedades, tratamientos: Presentacion de vocabularioAccidentes, enfermedades, tratamientos: Presentacion de vocabulario
Accidentes, enfermedades, tratamientos: Presentacion de vocabulario
 
17 Terrific Self Motivating Tips
17 Terrific Self Motivating Tips17 Terrific Self Motivating Tips
17 Terrific Self Motivating Tips
 
Partnering for Gulf Projects
Partnering for Gulf ProjectsPartnering for Gulf Projects
Partnering for Gulf Projects
 
10.3 venture capital term sheets.pptx
10.3 venture capital term sheets.pptx10.3 venture capital term sheets.pptx
10.3 venture capital term sheets.pptx
 
Bolein julio agosto
Bolein julio agostoBolein julio agosto
Bolein julio agosto
 
fire fighting certificate
fire fighting certificatefire fighting certificate
fire fighting certificate
 
Palestine Going Global
Palestine Going GlobalPalestine Going Global
Palestine Going Global
 
Motivational Interviewing
Motivational Interviewing Motivational Interviewing
Motivational Interviewing
 

Similaire à Emerging world order

Världens eko timme 2
Världens eko timme 2Världens eko timme 2
Världens eko timme 2
Victor Galaz
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Brent Guglielmino
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
PECB
 

Similaire à Emerging world order (20)

Threat assessment new normal
Threat assessment new normalThreat assessment new normal
Threat assessment new normal
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
15/3 -17 impact exponential technologies
15/3 -17 impact exponential technologies 15/3 -17 impact exponential technologies
15/3 -17 impact exponential technologies
 
Världens eko timme 2
Världens eko timme 2Världens eko timme 2
Världens eko timme 2
 
Talking Tech - the art and science of communicating complex ideas (Bristech2...
Talking Tech  - the art and science of communicating complex ideas (Bristech2...Talking Tech  - the art and science of communicating complex ideas (Bristech2...
Talking Tech - the art and science of communicating complex ideas (Bristech2...
 
IB Extended Essay English (LangLit) Example RPPF
IB Extended Essay English (LangLit) Example RPPFIB Extended Essay English (LangLit) Example RPPF
IB Extended Essay English (LangLit) Example RPPF
 
John Girard's Talk - ICKE 2013
John Girard's Talk - ICKE 2013 John Girard's Talk - ICKE 2013
John Girard's Talk - ICKE 2013
 
The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
 
American College of California Emergency Threats CounterMeasure Paper.pdf
American College of California Emergency Threats CounterMeasure Paper.pdfAmerican College of California Emergency Threats CounterMeasure Paper.pdf
American College of California Emergency Threats CounterMeasure Paper.pdf
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
So what if it's a bubble?
So what if it's a bubble?So what if it's a bubble?
So what if it's a bubble?
 
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
Reflective Essay Ehow
Reflective Essay EhowReflective Essay Ehow
Reflective Essay Ehow
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Toward a Strategy of Public Warning
Toward a Strategy of Public WarningToward a Strategy of Public Warning
Toward a Strategy of Public Warning
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 

Plus de Curtis A. Carver Jr.

It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcing
Curtis A. Carver Jr.
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday
Curtis A. Carver Jr.
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to action
Curtis A. Carver Jr.
 

Plus de Curtis A. Carver Jr. (20)

100 day letter
100 day letter100 day letter
100 day letter
 
Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
 
Deploying and utilizing statewide private cloud lessons learned
Deploying and utilizing statewide private cloud   lessons learnedDeploying and utilizing statewide private cloud   lessons learned
Deploying and utilizing statewide private cloud lessons learned
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
 
Four important trends in it and security implications
Four important trends in it and security implicationsFour important trends in it and security implications
Four important trends in it and security implications
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
 
Transform today to innovate for tomorrow
Transform today to innovate for tomorrowTransform today to innovate for tomorrow
Transform today to innovate for tomorrow
 
System level innovation
System level innovationSystem level innovation
System level innovation
 
It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcing
 
Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
 
Galileo at a Crossroads
Galileo at a CrossroadsGalileo at a Crossroads
Galileo at a Crossroads
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to action
 
Is Technology Leading the Change?
Is Technology Leading the Change?Is Technology Leading the Change?
Is Technology Leading the Change?
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Emerging world order