SlideShare une entreprise Scribd logo
1  sur  92
Télécharger pour lire hors ligne
* 21* 21ststC Cybersecurity Trends (2) *C Cybersecurity Trends (2) *
“Advanced Cybersecurity”“Advanced Cybersecurity”
1
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Advanced Cybersecurity”“Advanced Cybersecurity”
-- Artificial Intelligence & Machine LearningArtificial Intelligence & Machine Learning --
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew & RoscoeSons: Ethan, Matthew & Roscoe –– To their Secure Future!To their Secure Future!
*21stC кибербезопасности Тенденции (2)**21stC кибербезопасности Тенденции (2)*
Расширенный кибербезопасностиРасширенный кибербезопасности
2
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Расширенный кибербезопасностиРасширенный кибербезопасности
--Искусственный интеллект и машинного обученияИскусственный интеллект и машинного обучения--
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew & RoscoeSons: Ethan, Matthew & Roscoe –– To their Secure Future!To their Secure Future!
Cybersecurity TrendsCybersecurity Trends –– “Dual Themes”“Dual Themes”
Theme (1)Theme (1) –– “Integrated Cyber“Integrated Cyber--Physical Security:Physical Security: Securing the Internet of Things”Securing the Internet of Things”
-- TOTAL Security now requires Integration of CyberTOTAL Security now requires Integration of Cyber--Physical OperationsPhysical Operations
-- Recommendation for Board Level CSO to manage TOTAL Security OpsRecommendation for Board Level CSO to manage TOTAL Security Ops
-- Emergence of the “INTERNET of THINGS” as Future CyberEmergence of the “INTERNET of THINGS” as Future Cyber--Conflict ZoneConflict Zone
““ Integration”:Integration”: “TOTAL Extended Enterprise Security”“TOTAL Extended Enterprise Security” 09:0009:00 -- 2727thth Oct 2015Oct 2015
3
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
ThemeTheme (2)(2) –– “Advanced Cybersecurity:“Advanced Cybersecurity: Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
-- Transition from 20Transition from 20ththC Security to Hybrid AIC Security to Hybrid AI--Based 21Based 21ststC Cyber ModelsC Cyber Models
-- Using AI & Machine Learning to protect your Enterprise OperationsUsing AI & Machine Learning to protect your Enterprise Operations
-- Developing YOUR Action Plans for Advanced Cybersecurity Solutions!Developing YOUR Action Plans for Advanced Cybersecurity Solutions!
““Intelligence”:Intelligence”: ”Real”Real--Time SelfTime Self--Adaptive Cybersecurity”Adaptive Cybersecurity” 11:1511:15 -- 2727thth Oct 2015Oct 2015
Download SlideDownload Slides:s: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” --
4
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
11 –– Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
5
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity
•• 2020ththCC –– 19951995--2010 :2010 : Focus on Firewalls &
Antivirus – based upon Physical “Spatial”
Security Models (Castles & Moats)
.........Protection @ “Speed of Sound”“Speed of Sound” (Space)(Space)
6
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
.........Protection @ “Speed of Sound”“Speed of Sound” (Space)(Space)
•• 2121ststCC –– 20102010 –– 2025 :2025 : Focus on Adaptive, and
Self-Organising “Cyber” Tools – based upon
Temporal Models (AI & Machine Learning)
.........Defending @ “Speed of Light”“Speed of Light” (Time)(Time)
“Machine Learning Methods”“Machine Learning Methods” forfor
Cybersecurity developed from 2010Cybersecurity developed from 2010
7
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Since 2010, leading Cybersecurity Specialists have explored
AI & Machine Learning to mitigate cyber threats & attacks!
8
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012
9
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1)
10
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2)
11
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3)
12
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4)
13
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
1 – Background: 20th to 21stC Cybersecurity 22 –– AIAI & Machine Learning as Cyber Tools& Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
14
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising
Automata, Adaptive Stochastic Learning, Algorithms,
Robotics, Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
15
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new
malware that can no defined “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of
APT malware (Phishing, Trojans, Adware, Botnets...)
Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
16
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge University :Cambridge University : 19731973 -- 19761976
17
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Summer 1974Summer 1974 –– Dr David Eric ProbertDr David Eric Probert –– Cambridge Stats LabCambridge Stats Lab
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
18
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences
• Organic DNA-based Life has adaptation, learning
& intelligence based upon self-organisation:
–– Bee HivesBee Hives with regular Honeycombs
–– Ant ColoniesAnt Colonies & Termite Hills
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
19
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
–– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids
–– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security
–– Mammalian BrainsMammalian Brains evolved from Neural Networks
....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon
the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems”
20
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
-- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! --
The Sociable Weaver Bird
“World’s largest Bird Nests”
*** Southern Africa ***
21
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•Secure Living Community
•Self-Organising Architecture
•Fully scalable for long term growth
•Supports 250+ Weaver Birds
•Real-Time Disaster Alert System
•Sustainable in Semi-Desert Steppe
•Robust against “Enemy Risks”
such as Eagles, Vultures & Snakes
...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
“Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator:
-- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) --
22
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator
....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities”
Dynamic Duffing Equation: - Exhibits Chaotic Behaviour
23
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cellular Automata:Cellular Automata: “Games of Life“Games of Life””
-- Professor John Horton Conway FRSProfessor John Horton Conway FRS --
24
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set
25
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
““Machine LearningMachine Learning Algorithms”Algorithms”
26
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Basic Principles ofBasic Principles of ““Smart Security Solutions”Smart Security Solutions”
• The Application of Artificial Intelligence and Machine Learning
allows us to develop “Smart Security Solutions” as follows:
……..Smart Security Solutions typically possess the following features:……..Smart Security Solutions typically possess the following features:
1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks
2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
27
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to
scale in space & time from micro cells to macro solutions
6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data”
from Social Networks, Search & On-Line Commerce
7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations
………Now we’ll consider how such Smart AI………Now we’ll consider how such Smart AI--based Features can bebased Features can be
designed & engineered into future 21designed & engineered into future 21ststC Cybersecurity Toolkits...C Cybersecurity Toolkits...
Building our Smart Security “Toolkit”Building our Smart Security “Toolkit”
(1) Smart Decision Principles(1) Smart Decision Principles -- “D“D--Genes”Genes”
•• Business DecisionsBusiness Decisions require focusing & filtering of Big Data
sources in Space-Time to create local knowledge (Data Mining).
Hence a useful metaphor is the “Knowledge Lens”:
– Smart Decision “Genes” = Space, Time and Information Focus
– Conceptual “Knowledge Lens” can filter and focus information in
“Space” from searching Big Data Sets to a Small focused Short-List
28
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Space” from searching Big Data Sets to a Small focused Short-List
– The “Knowledge Lens” can focus information & present in real-time,
possibly as an stream of multi-media news or market intelligence
•• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle
in the design of smart securitysmart security, smart business & smart governance
....21stC Cyber Attacks (such as Denial of Service) occur in real....21stC Cyber Attacks (such as Denial of Service) occur in real--time @Optical Speedstime @Optical Speeds
via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!
Building our Smart Security “Toolkit”Building our Smart Security “Toolkit”
(2) Smart Learning Principles(2) Smart Learning Principles -- “L“L--Genes”Genes”
•• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and
Scalable Architecture. The Decision “Genes” are relatively traditional
whilst these new Learning “Genes” lie at the heart of Smart Security.
–– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems
and communities which include the well known self-organisation of insect
roles in communities such as ants & bees.
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple
29
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple
mathematical rules, as in Conway’s “Game of Life”
–– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in
complex chaotic behaviour as found in real world insect populations
–– Scalable ArchitectureScalable Architecture is also an essential feature of both plants & animal
life, and Mandelbrot’s theory of Fractal Curves provides vivid examples.
•• Current Trends:Current Trends: Research into Learning, Self-Organisation & Adaptation
remains extremely active in both ICT R&D Labs & Academic Institutions
“How to Build Smart Security Solutions?”“How to Build Smart Security Solutions?”
• Conceptually - Smart Solutions all use combinations of these
basic ICT “genes” shared with Intelligent Living Systems:
1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked)
2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time and Focus
30
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
4)4) Smart Solutions & Business Architecture:Smart Solutions & Business Architecture: Integration of the Decision +
Learning “Genes”, within a Secure & Resilient Systems Environment
......Using AI & Machine Learning we can now design “Smart” Self......Using AI & Machine Learning we can now design “Smart” Self--
Learning Cybersecurity Tools to secure YOUR Enterprise!Learning Cybersecurity Tools to secure YOUR Enterprise!
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 33 –– RecentRecent 2121ststC Cybersecurity VenturesC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
31
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
Recent 21Recent 21ststCC Cybersecurity VenturesCybersecurity Ventures
•• Darktrace:Darktrace: Enterprise Immune System
– Cambridge Venture (UK) that focuses on Adaptive
Behavioural Learning (Recursive Bayesian Rules)
•• LogRhythmLogRhythm:: Security Intelligence Platform
– Real-Time Machine Analytics & Data Intelligence based
upon Forensic Data Files (System & Event Logs)
32
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
– Real-Time Machine Analytics & Data Intelligence based
upon Forensic Data Files (System & Event Logs)
•• CyLonCyLon:: London-based Cybersecurity Incubator
– Start-Up Ventures: Ripjar, Cyberlytic, Digital Shadows,
Intruder, AimBrain, Mentat Innovations, and Surevine
•• Norse Corporation:Norse Corporation: San Francisco Venture focused upon
global real-time cyber threat monitoring & Analytics.
DarktraceDarktrace Cyber Intelligence PlatformCyber Intelligence Platform
33
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
34
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Web:Web: www.darktrace.com/industrieswww.darktrace.com/industries
DARKDARKTRACETRACE
LogRhythmLogRhythm:: Security IntelligenceSecurity Intelligence
35
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Corporate Web:Corporate Web: www.LogRhythm.comwww.LogRhythm.com
Norse Corporation:Norse Corporation: Intelligence ServiceIntelligence Service
36
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation
GlobalGlobal “Real“Real--Time”Time” DarkNetDarkNet CyberAttacksCyberAttacks
37
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation
2020thth June 2014 :June 2014 : GlobalGlobal CyberAttacksCyberAttacks @@ “Speed of Light”“Speed of Light”
“Smart Analysis Tools”“Smart Analysis Tools”:: 4D Simulation Modelling4D Simulation Modelling
for Hybrid Terror Alert & Disaster Managementfor Hybrid Terror Alert & Disaster Management
38
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
44 –– AdvancedAdvanced Cyber Scenarios and AnalysisCyber Scenarios and Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
39
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
44 –– AdvancedAdvanced Cyber Scenarios and AnalysisCyber Scenarios and Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
AdvancedAdvanced Cyber ScenariosCyber Scenarios & Analysis& Analysis
•• Insider Security Threats:Insider Security Threats: Adaptive Modelling &
Learning provides early alert to unusual cyber
behavioural such as remote logons, data
downloads, finance transfers & malicious access.
•• Zero Day & APTs:Zero Day & APTs: Traditional Cyber Tools are
40
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Zero Day & APTs:Zero Day & APTs: Traditional Cyber Tools are
weak with sudden attacks, whilst real-time AI
tools can provide instant management alerts.
•• Securing the “Internet of Things”:Securing the “Internet of Things”: The IoT can
only be effectively secured through distributed
AI-based self-organising & adaptive security tools.
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
41
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 55 –– HybridHybrid 2020ththC & 21C & 21ststC Cyber SolutionsC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
Hybrid 20Hybrid 20ththC & 21C & 21ststCC Cyber SolutionsCyber Solutions
• Effective 21stC Enterprise Cybersecurity requires CSOs
to deploy Hybrid SolutionsHybrid Solutions:
–– Physical SecurityPhysical Security – Perimeter, Access Controls, CCTV,
Biometrics, Staff Profiling & Vetting
–– Traditional Cyber ToolsTraditional Cyber Tools – Firewalls, Anti-Virus, DDOS Alerts,
& Malware & Adware Protection
42
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
& Malware & Adware Protection
–– Advanced Cyber ToolsAdvanced Cyber Tools – AI-based Network & User
Behaviour Modelling (Enterprise Immune System)
•• New GenerationNew Generation Intelligent “Cyber” Tools will evolve
during the next 5 to 10 years for “Smart Security”“Smart Security”
– We define ““CyberVisionsCyberVisions”” for 20202020 (5 years - Integrated),
20252025 (10 Years - Adaptive) and 20402040 (25 Years - Neural) .
Hybrid 21Hybrid 21ststC Organisation:C Organisation: Hierarchical & OrganicHierarchical & Organic
•• TransitionTransition from 19thC/20thC to 21stC Business & Governance
requires fundamental re-structuring of operations:
–– 1919ththC /20C /20ththC Industrial Organisations:C Industrial Organisations: Hierarchical
Bureaucracies (Pyramids) to process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer
Business & Agencies with data processed in cyber clouds
43
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Business & Agencies with data processed in cyber clouds
•• Living SystemsLiving Systems, such as mammals, use hybrid organisation of
their extended nervous system (brain & body) to optimise
real-time learning and environmental adaptation
•• Smart Security SolutionsSmart Security Solutions will also require hybrid organisation
to optimise real-time response to cyber & physical attacks.
Smart SecuritySmart Security based upon AI & Machinebased upon AI & Machine
Learning will span ALLLearning will span ALL Economic SectorsEconomic Sectors
(1) Banking and Financial Services
(2) Healthcare and Social Welfare
(3) ICT, Mobile and Telecommunications
(4) Education and Research
(5) Manufacturing & Logistics
44
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
(5) Manufacturing & Logistics
(6) Retail and Distribution
(7) Central & Regional Government
.....ALL.....ALL Economic SectorsEconomic Sectors will eventually require embeddedwill eventually require embedded
”smart security””smart security” in order to provide realin order to provide real--time resilience totime resilience to
simultaneous physical & cyber attacks, crime or terrorism.simultaneous physical & cyber attacks, crime or terrorism.
“Smart Security”“Smart Security” -- Banking and FinanceBanking and Finance
• For each economic sector we’ll begin by analysing each of the critical sectors in the
context of the Smart Genetic Design Principles of “Decisions” and “Learning”, and then
discuss the implications for upgraded Smart Security and Governance:
–– Smart Decisions:Smart Decisions:
•• GeoGeo--Location:Location: Smart Mobile Banking, with GPS Location to provide suggestions for shopping
(based on profile), cafes, restaurants, nearby on-line friends…
•• RealReal--Time:Time: Financial & Commodity Trading, on-line share dealing, maximise interest rates, foreign
exchange dealing. Banking has really pioneered “real-time” financial trading & networking during
last 30 years!
•• Knowledge Lens:Knowledge Lens: Deep Data Mining, Business Intelligence2.0 and CRM (Customer Relationship
Management for Banking & Investment Clients
–– Smart Learning:Smart Learning:
45
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Smart Learning:Smart Learning:
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Investment Banks have pioneered applications of Smart Neural
Network Apps, Adaptive Trading and Real-Time Risk Management.
•• Massive Memory & Storage:Massive Memory & Storage: Secure Resilient Databases are Fundamental to Banking
•• Scalable Architecture:Scalable Architecture: Banks are moving from “bricks & mortar” to global scalable networks, and
most now provide mobile & home banking “apps” and highly secure on-line account services
–– Smart Sustainable SecuritySmart Sustainable Security Encryption, Portable Pin Pads, Biometrics, Cyber Risk
Management
–– Smart Governance, Management and Operations :Smart Governance, Management and Operations : Data Integrity, Compliance & Audit,
New Financial Regulations
“Smart Security”“Smart Security” –– Healthcare & Social WelfareHealthcare & Social Welfare
–– Smart Decisions:Smart Decisions:
•• GeoGeo--Location:Location: GPS Location for Medical Emergencies, Patient Images, Crisis
Management, Ambulance Routing, Regional Social Support
•• RealReal--Time:Time: On-Line Telemedicine Consultation & Preliminary Diagnosis. Also
Smart Support during Intensive Hospital Surgery
•• Knowledge Lens:Knowledge Lens: Filtering & Analysing Complex 3D Medical Scan Images, as
well as future Data Mining for On-Line Patient Records
–– Smart Learning:Smart Learning:
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Challenging Medical Research in New
46
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Challenging Medical Research in New
Treatments for Cancer & Neural Diseases through Global Partnerships
•• Massive Memory & Storage:Massive Memory & Storage: Design, Analysis and extensive Patient Trials of
New Pharmaceutical Drugs, including new “Smart Drugs”
•• Scalable Architecture:Scalable Architecture: National professional support network for both social
welfare as well as citizen health, diagnosis and treatments
–– Smart Security:Smart Security: Cybersecurity & Personal Privacy for Patient Records, as well as
integrated security for hospitals, medical assets, drugs & social welfare facilities
–– Smart Governance:Smart Governance: Professional Government Support, Management & Funding
for National Medical & Social Welfare Services
“Smart Security”“Smart Security” -- ICT, Mobile & TelecommunicationsICT, Mobile & Telecommunications
–– Smart Decisions:Smart Decisions:
•• GeoGeo--Location:Location: Local Mobile Information – Maps, Satellite Imagery,
Climate, Geology, History, On-Line Persons on Smart Devices.
•• RealReal--Time:Time: Financial Transactions, ePayments, eGovernment Services,
IM, Social Media, MMORG and Immersive Virtual Worlds
•• Knowledge Lens:Knowledge Lens: Global Data & Information can be filtered and
focused for Local Decisions with ICT enabled “Knowledge Lens”
–– Smart Learning:Smart Learning:
47
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Smart Learning:Smart Learning:
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Mobile, Wireless & Cellular Ad-Hoc
Networks use adaptive routing & roaming protocols
•• Massive Memory & Storage:Massive Memory & Storage: ICT provides the essential Smart Storage
& Processing Tools including System Virtualisation & Cloud Computing
•• Scalable Architecture:Scalable Architecture: Fundamental for smart ICT systems that already
scale from nano machines to global search & social media “apps”
–– Smart Security:Smart Security: Cybersecurity needs to be embedded EVERYWHERE!
–– Smart Governance:Smart Governance: ICT requires new laws, regulations & governance
“Smart Security”“Smart Security” -- Education & ResearchEducation & Research
–– Smart Decisions:Smart Decisions:
•• GeoGeo--Location:Location: Mobile Education, Navigation & Mapping, Augmented &
Immersive Reality based on Geo-Location with Mobile Devices & Headsets
•• RealReal--Time:Time: Networked Laboratories for Synchronised Parallel Research in
Genetics, High-Energy Physics, Optical & Radio-Astronomy
•• Knowledge Lens:Knowledge Lens: Smart Grid Computing with In-Depth Data Mining in search for
New Particles in CERN LHC Collider.
–– Smart Learning:Smart Learning:
48
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Smart Learning:Smart Learning:
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Virtual On-Line Colleges for remote students.
Collaborative academic & commercial Techno Parks & Labs
•• Massive Memory & Storage:Massive Memory & Storage: Crowd Sourced Volunteer PC Research as in the
SETI Project (BOINC – Berkeley Open Net Computing)
•• Scalable Architecture:Scalable Architecture: Business Opportunities for Global Niche College for
minority study & research themes. Study courses on mobile “apps”!
–– Smart Security:Smart Security: College Campus & Laboratory Cyber & Physical Security
–– Smart Governance:Smart Governance: Rigorous Educational Data Audit & Compliance Regime
“Smart Security”“Smart Security” -- GovernmentGovernment
–– Smart Decisions:Smart Decisions:
•• GeoGeo--Location:Location: Tracking all government assets, physical & electronic documents and
devices to reduce loss or corruption of information
•• RealReal--Time:Time: Ensure that the government ALWAYS has complete real-time info on its
resources, staff and financial & political affairs
•• Knowledge Lens:Knowledge Lens: “In-Depth” Smart Data Mining to link Government Databases
relating to ALL Government Ministries & Agencies
–– Smart Learning:Smart Learning:
•• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Flexible Networked Government Organisations and
Operations to respond to evolving national & international events, policies & overall
49
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Operations to respond to evolving national & international events, policies & overall
business & political environment
•• Massive Memory & Storage:Massive Memory & Storage: Ability to store and analyse PetaBytes of Government
Data relating to Programmes, Policies & Governance
•• Scalable ArchitectureScalable Architecture: Efficient networked operational framework for the transparent
management of national, region and local citizen programmes
–– Smart Security:Smart Security: Implementation of integrated Physical and Cyber Security Operations
according to International Standards – ISO/ITU
–– Smart Governance:Smart Governance: Provision of Open eGovernment Portal supporting ALL major
Ministries, Agencies and Partners for On-Line Transaction Processing & Analysis
1 – Background: 20th to 21stC Cybersecurity 2 – Cyber Players & Targets 3 – Recent 21stC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 66 –– Scenario 2020: Integrated SecurityScenario 2020: Integrated Security -- IoTIoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
50
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 66 –– Scenario 2020: Integrated SecurityScenario 2020: Integrated Security -- IoTIoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
OurOur CyberVisionsCyberVisions:: 2015 to 20402015 to 2040
•• ScenarioScenario 20202020 –– Integrated SecurityIntegrated Security--IoTIoT:: Managed
Integration of IoT, Cyber & Physical Ops under CSO
•• ScenarioScenario 20252025 –– Adaptive Security:Adaptive Security: Transition to
51
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• ScenarioScenario 20252025 –– Adaptive Security:Adaptive Security: Transition to
Global Real-Time AI & ML Based Cyber Applications
•• ScenarioScenario 20402040 –– Neural Security:Neural Security: Enterprise-Wide
Deployment of Real-Time AI-Based Cyber Defences
ScenarioScenario 2020:2020: Integrated SecurityIntegrated Security -- IoTIoT
• ....5 Year Time Window - 2010 <2010 <–– 20152015 --> 2020> 2020
• Integrated CyberCyber--Physical SecurityPhysical Security deployed &
managed by Board Level Chief Security Officer
•• International StandardsInternational Standards for “IoT” APIs, Net
Interface, Security Standards & Operations
52
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• International StandardsInternational Standards for “IoT” APIs, Net
Interface, Security Standards & Operations
•• Distributed SecurityDistributed Security for “Legacy”“Legacy” Network
Assets & Devices for the “Internet of Things”
• Trial Deployment of Advanced AIAdvanced AI--basedbased
Intelligent & Adaptive Cybersecurity Tools
Transition from 20Transition from 20ththC to 21C to 21ststCC Smart SecuritySmart Security
•• Cybersecurity 2015Cybersecurity 2015--2020:2020:
– Every country in the world will need to transition from the traditional 20thC
culture & policy of massive physical defence to the connected “neural”
21stC world of in-depth intelligent & integrated cyber defence solutions
•• National Boundaries:National Boundaries:
– Traditional physical defence and geographical boundaries are still strategic
national assets , but they need to be augmented through integrated cyber
defence organisations & assets.
53
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
defence organisations & assets.
•• Critical National Information Infrastructure:Critical National Information Infrastructure:
– 21stC national economies function electronically, & yet they are poorly
defended in cyberspace, and very often open to criminal & political attacks
•• MultiMulti--Dimensional Cyber Defence:Dimensional Cyber Defence:
– Nations need to audit their critical infrastructure – government, banks,
telecommunications, energy, & transport – and to upgrade to international
cybersecurity standards based upon accepted “best practice” (ISO/IEC)
EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020
54
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyber 2020 Visions:Cyber 2020 Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton
and The Australian Government (Defence)and The Australian Government (Defence)
55
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
56
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
77 –– ScenarioScenario 2025: Self2025: Self--Adaptive SecurityAdaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
ScenarioScenario 20252025:: SelfSelf--Adaptive SecurityAdaptive Security
• ..10 Year Time Window - 2005 <2005 <–– 20152015 --> 2025> 2025
• Transition & Full Deployment of Enterprise-
Wide AI-based SelfSelf--AdaptiveAdaptive “Cyber” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL
aspects of Net Traffic, System/Event Logs, Net
57
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
• Real-Time Behavioural ModellingBehavioural Modelling of ALL
aspects of Net Traffic, System/Event Logs, Net
Nodes, Servers, Databases, Devices & Users
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both traditional
& advanced AI-based “Cybersecurity Tools”
CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios
*** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon ***
58
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
59
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Microsoft 2025:Microsoft 2025: Cyberspace ScenariosCyberspace Scenarios
Technology Visions:Technology Visions: ScenarioScenario 20252025
60
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
61
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 88 –– Scenario 2040: Neural SecurityScenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
ScenarioScenario 2040:2040: Neural SecurityNeural Security
• ..25 Year Time Window - 1990 <1990 <–– 20152015 --> 2040> 2040
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI-based
Cyber Event, Traffic & User Modelling
62
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational
Standards for “Smart Systems”“Smart Systems” – Smart Devices,
Business, Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
ultra-intelligent – “Neural Security”“Neural Security” .
1984: “Birth” of Intelligent Networks1984: “Birth” of Intelligent Networks
andand “Death” of Personal Privacy“Death” of Personal Privacy ??
63
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
-- City Business SystemsCity Business Systems –– British TelecomBritish Telecom ––
Launch of RealLaunch of Real--Time Financial Trading:Time Financial Trading: 19841984
64
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
65
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Algorithmic Computer Trading using Real-Time Neural Nets
& Statistical Maths Tools have been used for 20+ Years!
.....Now they are being applied to provide intelligent
real-time forecasts for enterprise cybersecurity threats!
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
66
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Smart Workplace:Smart Workplace: 20402040 –– Johnson ControlsJohnson Controls
67
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Scenario 2040: CyberScenario 2040: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
68
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense::
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
69
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040
70
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Our Cybersecurity Industry 25 Year Challenge:Our Cybersecurity Industry 25 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
71
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning”
72
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT
7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 99 –– YOURYOUR Action Plan for Advanced Cyber!Action Plan for Advanced Cyber!
1990 <1990 <–– 20152015 ––> 2040:> 2040: Next 25 YearsNext 25 Years
•• IoT:IoT: Global Connected “Internet of Things” – All On-Line
Intelligent Devices across ALLALL sectors & geographies.
•• “The Bad Cyber Guys” :“The Bad Cyber Guys” : Professionally Trained Cyber Criminals
and Cyber Terrorists operating World Wide!
•• Augmented Reality:Augmented Reality: Emergence & Full Deployment of 4D
Immersive Virtual Augmented Reality (a la Matrix Movies(a la Matrix Movies)
•• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in
73
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in
ALL intelligent devices, servers, data & network nodes
•• OnOn--LineLine CyberPoliceCyberPolice:: Cyber Bot Avatars patrolling as Virtual
Cyber Police Force across “Internet of Things”“Internet of Things”
.....Meet the Long Term Challenge of Deploying AI & Machine
Learning Based Cybersecurity Tools across YOUR Enterprise!YOUR Enterprise!
YOUR Action Plan forYOUR Action Plan for Advanced “Cyber”!Advanced “Cyber”!
•• Action 1:Action 1: Board-Level Review & Audit of current
Cybersecurity Tools & Operations – 60 days
•• Action 2:Action 2: Highlight security issues & insecure
legacy net assets, devices & processes – 30 days
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
74
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
Roadmap for Advanced “Cyber” to include:
a) Cyber-Physical Operational Integration
b) IoT Security for both Legacy & New Assets
c) Training and Testing of AI-based “Cyber” Tools.
“Real“Real--Time Defence”Time Defence” for Alien Invaders”for Alien Invaders”
A.I. & Machine LearningA.I. & Machine Learning
Cybersecurity Tools willCybersecurity Tools will
ProvideProvide “Speed of Light”“Speed of Light”
RealReal--Time Defence againstTime Defence against
75
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
RealReal--Time Defence againstTime Defence against
“DARK”“DARK” Threats &Threats & Attacks!Attacks!
“Steam Powered Birds arrive over our Cities! - 1981
Pen & Ink Drawing by Alexander RimskiAlexander Rimski--KorsakovKorsakov
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
76
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
EastEast--West Security ConferenceWest Security Conference –– Spain2015Spain2015
-- 2121ststCC CyberTrendsCyberTrends Presentation Slides (PDF)Presentation Slides (PDF) --
77
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download Link:Download Link: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
Theme (1)Theme (1) –– “Integrated Security”“Integrated Security” Theme (2)Theme (2) –– “Advanced Cybersecurity“Advanced Cybersecurity”
*** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing ***
SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres
78
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet...
15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes killedkilled in Avalanchein Avalanche »»
Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents
79
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cybersecurity Trends (Cybersecurity Trends (2): AI & Machine Learning2): AI & Machine Learning
International EastInternational East--West Security Conference: Spain, ItalyWest Security Conference: Spain, Italy
Cybersecurity Trends (Cybersecurity Trends (2): AI & Machine Learning2): AI & Machine Learning
International EastInternational East--West Security Conference: Spain, ItalyWest Security Conference: Spain, Italy
80
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
81
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
82
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
83
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1stst Class Honours Degree in Mathematics (BristolClass Honours Degree in Mathematics (Bristol
University) & PhD from Cambridge University in SelfUniversity) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) , and hisOrganising Systems (Evolution of Stochastic Automata) , and his
full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2016 Editions2016 Editions.
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
84
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download:Download: www.valentina.net/DigiTec2012/
Cybersecurity Trends (1) : “Integrated Security”Cybersecurity Trends (1) : “Integrated Security”
International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain
85
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
86
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
87
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
21stC Architectures for Smart Business Sectors21stC Architectures for Smart Business Sectors
• We can also design new economic architectures using our Smart
Design Principles & then customise sector by sector. We focus upon
adaptation, scaling, massive data, & network transparency:
–– Education & Research:Education & Research: Transition from Monolithic to Niche Networks
–– HealthCare & Social Welfare:HealthCare & Social Welfare: Telemedicine for towns & villages
–– Banking & Finance:Banking & Finance: “Real-Time” financial & commodity trading
–– Transportation:Transportation: Smart Airports, Roads and Transportation Services
–– ICT Infrastructure:ICT Infrastructure: Launch 3G/4G Mobile Networks, and maximise Internet
88
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– ICT Infrastructure:ICT Infrastructure: Launch 3G/4G Mobile Networks, and maximise Internet
Services, Local Wireless Hubs & eGovernance across all supported Regions
–– National Security & DefenceNational Security & Defence:: Both for Physical Borders & CyberSpace
–– Travel & Tourism:Travel & Tourism: Major opportunities for on-line bookings & marketing
–– Energy & Utilities:Energy & Utilities: Secure Management of National Energy & Utility Grids
•• Tomorrow morning we’ll explore the practical design requirements ofTomorrow morning we’ll explore the practical design requirements of
Smart Security Solutions for Critical National Infrastructure (CNI) .....Smart Security Solutions for Critical National Infrastructure (CNI) .....
2121ststC Smart Models for BusinessC Smart Models for Business
• From 1980s onwards, many Enterprises started to deploy ICT networks, and
then to “flatten” their organisations from Hierarchical to Hybrid.
• In the 21stC, Business is now starting to fully deploy more advanced ICT
Solutions using the “Smart Design Principles”“Smart Design Principles” that we summarise below:
–– SpaceSpace--Time Awareness:Time Awareness: Utilise GPS Location and RFID Technologies to Track and Trace both
Products, Staff and all moveable Business Assets to provide Real-Time Corporation
–– AdaptationAdaptation to Markets, New Product Features, Delivery Logistics, Minimise Stock Levels
–– Massive Memory & Storage:Massive Memory & Storage: Low Cloud Storage Costs permit massive data mining on
89
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Massive Memory & Storage:Massive Memory & Storage: Low Cloud Storage Costs permit massive data mining on
customer orders, profiles, search and buying behaviours. Already used by major international
supermarket chains & global on-line players such as Amazon, eBay, Google.
–– Sustainable Security :Sustainable Security : Integrated adaptive management of cyber and physical security
–– SelfSelf--OrganisationOrganisation:: Empower staff for Local Decisions with almost “Flat Organisation”
–– Scalable ArchitectureScalable Architecture:: Building Business as Cellular Organisation using High-Speed Nets
–– Systems Integration:Systems Integration: Many Businesses need to integrate their on-line cyber & traditional
physical operations to provide a integrated & coherent cyber-physical managed operation
...Now for examples of smart systems...Now for examples of smart systems –– “Self“Self--Organisation” & “Scalability” in scienceOrganisation” & “Scalability” in science
Cyber “Genes” forCyber “Genes” for Smart SystemsSmart Systems
• Intelligent Systems, either Artificial or Organic – Living Systems - are
based on just a few shared common principles that include:
1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks
2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
4)4) Sustainable Security :Sustainable Security : Embedded Smart Security – Everywhere!
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale
90
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale
in space & time from micro cells to macro solutions
6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from
Social Networks, Search & On-Line Commerce
7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations
……Advanced ICT Solutions now provide ALL these “Genetic” Functions……Advanced ICT Solutions now provide ALL these “Genetic” Functions
which will enable us to designwhich will enable us to design Smart CyberSmart Cyber--Physical Security SolutionsPhysical Security Solutions
Smart SecuritySmart Security –– “Design Toolkit”“Design Toolkit”
• The plan is now to apply the Smart Decision and Learning “Genes” as the
design tools for critical economic sectors such as Banking, Energy & Defence
–– Smart Decision “DSmart Decision “D--Genes” :Genes” : Spatial Geo-Location, Real-Time Operations,
& Transforming Data to Decision through “Knowledge Lens”
–– Smart Learning “LSmart Learning “L--Genes”:Genes”: Adaptation, Self-Organisation, Scalable
Architecture and Massive Memory & Data Storage
91
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Architecture and Massive Memory & Data Storage
–– Smart Sustainability:Smart Sustainability: Joint Operations for Cyber & Physical Security
–– Smart Governance:Smart Governance: On-Line eGovernment Services together with new
Laws, Legislation & Regulations for Cybercrime, eCommerce & Privacy
…..Together these Smart Principles form our…..Together these Smart Principles form our “Design Toolkit”!“Design Toolkit”!
92
“Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity ––
Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
- Madrid, Spain: 26th – 27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility

Contenu connexe

Tendances

Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsKrishnaram Kenthapadi
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)Executive Leaders Network
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningMark Underwood
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 

Tendances (20)

Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML Systems
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 

En vedette

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defenseUjjwal Tripathi
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentationlpaviglianiti
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningRahul Jain
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceu053675
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligencePatrick Walter
 
MOBILE DEVICE FORENSICS USING NLP
MOBILE DEVICE FORENSICS USING NLPMOBILE DEVICE FORENSICS USING NLP
MOBILE DEVICE FORENSICS USING NLPAnkita Jadhao
 
State of Cybersecurity: 2016 Findings and Implications
State of Cybersecurity: 2016 Findings and ImplicationsState of Cybersecurity: 2016 Findings and Implications
State of Cybersecurity: 2016 Findings and ImplicationsPriyanka Aash
 
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)Imran Ali
 
Artificial Intelligence - Azeem Azhar
Artificial Intelligence - Azeem AzharArtificial Intelligence - Azeem Azhar
Artificial Intelligence - Azeem AzharAnthemis Group
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Alex Pinto
 

En vedette (20)

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
MOBILE DEVICE FORENSICS USING NLP
MOBILE DEVICE FORENSICS USING NLPMOBILE DEVICE FORENSICS USING NLP
MOBILE DEVICE FORENSICS USING NLP
 
Cybersecurity 4.0
Cybersecurity 4.0Cybersecurity 4.0
Cybersecurity 4.0
 
State of Cybersecurity: 2016 Findings and Implications
State of Cybersecurity: 2016 Findings and ImplicationsState of Cybersecurity: 2016 Findings and Implications
State of Cybersecurity: 2016 Findings and Implications
 
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)
13: Practical Artificial Intelligence & Machine Learning (Arturo Servin)
 
Artificial Intelligence - Azeem Azhar
Artificial Intelligence - Azeem AzharArtificial Intelligence - Azeem Azhar
Artificial Intelligence - Azeem Azhar
 
INSURANCE 4 DRONE PILOTS 2
INSURANCE 4 DRONE PILOTS 2INSURANCE 4 DRONE PILOTS 2
INSURANCE 4 DRONE PILOTS 2
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 

Similaire à Artificial Intelligence and Machine Learning for Cybersecurity

Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
 
Smart Solutions and Business Architectures - Master Class Lecture
Smart Solutions and Business Architectures - Master Class LectureSmart Solutions and Business Architectures - Master Class Lecture
Smart Solutions and Business Architectures - Master Class LectureDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 

Similaire à Artificial Intelligence and Machine Learning for Cybersecurity (20)

Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Smart Solutions and Business Architectures - Master Class Lecture
Smart Solutions and Business Architectures - Master Class LectureSmart Solutions and Business Architectures - Master Class Lecture
Smart Solutions and Business Architectures - Master Class Lecture
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 

Plus de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Plus de Dr David Probert (13)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Dernier

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Dernier (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Artificial Intelligence and Machine Learning for Cybersecurity

  • 1. * 21* 21ststC Cybersecurity Trends (2) *C Cybersecurity Trends (2) * “Advanced Cybersecurity”“Advanced Cybersecurity” 1 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference “Advanced Cybersecurity”“Advanced Cybersecurity” -- Artificial Intelligence & Machine LearningArtificial Intelligence & Machine Learning -- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew & RoscoeSons: Ethan, Matthew & Roscoe –– To their Secure Future!To their Secure Future!
  • 2. *21stC кибербезопасности Тенденции (2)**21stC кибербезопасности Тенденции (2)* Расширенный кибербезопасностиРасширенный кибербезопасности 2 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Расширенный кибербезопасностиРасширенный кибербезопасности --Искусственный интеллект и машинного обученияИскусственный интеллект и машинного обучения-- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew & RoscoeSons: Ethan, Matthew & Roscoe –– To their Secure Future!To their Secure Future!
  • 3. Cybersecurity TrendsCybersecurity Trends –– “Dual Themes”“Dual Themes” Theme (1)Theme (1) –– “Integrated Cyber“Integrated Cyber--Physical Security:Physical Security: Securing the Internet of Things”Securing the Internet of Things” -- TOTAL Security now requires Integration of CyberTOTAL Security now requires Integration of Cyber--Physical OperationsPhysical Operations -- Recommendation for Board Level CSO to manage TOTAL Security OpsRecommendation for Board Level CSO to manage TOTAL Security Ops -- Emergence of the “INTERNET of THINGS” as Future CyberEmergence of the “INTERNET of THINGS” as Future Cyber--Conflict ZoneConflict Zone ““ Integration”:Integration”: “TOTAL Extended Enterprise Security”“TOTAL Extended Enterprise Security” 09:0009:00 -- 2727thth Oct 2015Oct 2015 3 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference ThemeTheme (2)(2) –– “Advanced Cybersecurity:“Advanced Cybersecurity: Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” -- Transition from 20Transition from 20ththC Security to Hybrid AIC Security to Hybrid AI--Based 21Based 21ststC Cyber ModelsC Cyber Models -- Using AI & Machine Learning to protect your Enterprise OperationsUsing AI & Machine Learning to protect your Enterprise Operations -- Developing YOUR Action Plans for Advanced Cybersecurity Solutions!Developing YOUR Action Plans for Advanced Cybersecurity Solutions! ““Intelligence”:Intelligence”: ”Real”Real--Time SelfTime Self--Adaptive Cybersecurity”Adaptive Cybersecurity” 11:1511:15 -- 2727thth Oct 2015Oct 2015 Download SlideDownload Slides:s: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
  • 4. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity -- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” -- 4 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 5. 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 11 –– Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 5 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 6. Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity •• 2020ththCC –– 19951995--2010 :2010 : Focus on Firewalls & Antivirus – based upon Physical “Spatial” Security Models (Castles & Moats) .........Protection @ “Speed of Sound”“Speed of Sound” (Space)(Space) 6 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference .........Protection @ “Speed of Sound”“Speed of Sound” (Space)(Space) •• 2121ststCC –– 20102010 –– 2025 :2025 : Focus on Adaptive, and Self-Organising “Cyber” Tools – based upon Temporal Models (AI & Machine Learning) .........Defending @ “Speed of Light”“Speed of Light” (Time)(Time)
  • 7. “Machine Learning Methods”“Machine Learning Methods” forfor Cybersecurity developed from 2010Cybersecurity developed from 2010 7 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Since 2010, leading Cybersecurity Specialists have explored AI & Machine Learning to mitigate cyber threats & attacks!
  • 8. 8 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 9. Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012 9 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 10. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1) 10 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 11. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2) 11 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 12. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3) 12 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 13. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4) 13 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
  • 14. 1 – Background: 20th to 21stC Cybersecurity 22 –– AIAI & Machine Learning as Cyber Tools& Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 14 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 15. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices 15 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new malware that can no defined “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...)
  • 16. Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 16 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 17. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge University :Cambridge University : 19731973 -- 19761976 17 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Summer 1974Summer 1974 –– Dr David Eric ProbertDr David Eric Probert –– Cambridge Stats LabCambridge Stats Lab
  • 18. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 18 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 19. SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences • Organic DNA-based Life has adaptation, learning & intelligence based upon self-organisation: –– Bee HivesBee Hives with regular Honeycombs –– Ant ColoniesAnt Colonies & Termite Hills –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations 19 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations –– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids –– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security –– Mammalian BrainsMammalian Brains evolved from Neural Networks ....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
  • 20. SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems” 20 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 21. -- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! -- The Sociable Weaver Bird “World’s largest Bird Nests” *** Southern Africa *** 21 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •Secure Living Community •Self-Organising Architecture •Fully scalable for long term growth •Supports 250+ Weaver Birds •Real-Time Disaster Alert System •Sustainable in Semi-Desert Steppe •Robust against “Enemy Risks” such as Eagles, Vultures & Snakes ...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
  • 22. “Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator: -- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) -- 22 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 23. Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator ....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities” Dynamic Duffing Equation: - Exhibits Chaotic Behaviour 23 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 24. Cellular Automata:Cellular Automata: “Games of Life“Games of Life”” -- Professor John Horton Conway FRSProfessor John Horton Conway FRS -- 24 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 25. “Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set 25 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 26. ““Machine LearningMachine Learning Algorithms”Algorithms” 26 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 27. Basic Principles ofBasic Principles of ““Smart Security Solutions”Smart Security Solutions” • The Application of Artificial Intelligence and Machine Learning allows us to develop “Smart Security Solutions” as follows: ……..Smart Security Solutions typically possess the following features:……..Smart Security Solutions typically possess the following features: 1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks 2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 27 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale in space & time from micro cells to macro solutions 6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from Social Networks, Search & On-Line Commerce 7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations ………Now we’ll consider how such Smart AI………Now we’ll consider how such Smart AI--based Features can bebased Features can be designed & engineered into future 21designed & engineered into future 21ststC Cybersecurity Toolkits...C Cybersecurity Toolkits...
  • 28. Building our Smart Security “Toolkit”Building our Smart Security “Toolkit” (1) Smart Decision Principles(1) Smart Decision Principles -- “D“D--Genes”Genes” •• Business DecisionsBusiness Decisions require focusing & filtering of Big Data sources in Space-Time to create local knowledge (Data Mining). Hence a useful metaphor is the “Knowledge Lens”: – Smart Decision “Genes” = Space, Time and Information Focus – Conceptual “Knowledge Lens” can filter and focus information in “Space” from searching Big Data Sets to a Small focused Short-List 28 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference “Space” from searching Big Data Sets to a Small focused Short-List – The “Knowledge Lens” can focus information & present in real-time, possibly as an stream of multi-media news or market intelligence •• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle in the design of smart securitysmart security, smart business & smart governance ....21stC Cyber Attacks (such as Denial of Service) occur in real....21stC Cyber Attacks (such as Denial of Service) occur in real--time @Optical Speedstime @Optical Speeds via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!
  • 29. Building our Smart Security “Toolkit”Building our Smart Security “Toolkit” (2) Smart Learning Principles(2) Smart Learning Principles -- “L“L--Genes”Genes” •• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and Scalable Architecture. The Decision “Genes” are relatively traditional whilst these new Learning “Genes” lie at the heart of Smart Security. –– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems and communities which include the well known self-organisation of insect roles in communities such as ants & bees. –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple 29 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple mathematical rules, as in Conway’s “Game of Life” –– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in complex chaotic behaviour as found in real world insect populations –– Scalable ArchitectureScalable Architecture is also an essential feature of both plants & animal life, and Mandelbrot’s theory of Fractal Curves provides vivid examples. •• Current Trends:Current Trends: Research into Learning, Self-Organisation & Adaptation remains extremely active in both ICT R&D Labs & Academic Institutions
  • 30. “How to Build Smart Security Solutions?”“How to Build Smart Security Solutions?” • Conceptually - Smart Solutions all use combinations of these basic ICT “genes” shared with Intelligent Living Systems: 1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked) 2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time and Focus 30 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 4)4) Smart Solutions & Business Architecture:Smart Solutions & Business Architecture: Integration of the Decision + Learning “Genes”, within a Secure & Resilient Systems Environment ......Using AI & Machine Learning we can now design “Smart” Self......Using AI & Machine Learning we can now design “Smart” Self-- Learning Cybersecurity Tools to secure YOUR Enterprise!Learning Cybersecurity Tools to secure YOUR Enterprise!
  • 31. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 33 –– RecentRecent 2121ststC Cybersecurity VenturesC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 31 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 32. Recent 21Recent 21ststCC Cybersecurity VenturesCybersecurity Ventures •• Darktrace:Darktrace: Enterprise Immune System – Cambridge Venture (UK) that focuses on Adaptive Behavioural Learning (Recursive Bayesian Rules) •• LogRhythmLogRhythm:: Security Intelligence Platform – Real-Time Machine Analytics & Data Intelligence based upon Forensic Data Files (System & Event Logs) 32 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference – Real-Time Machine Analytics & Data Intelligence based upon Forensic Data Files (System & Event Logs) •• CyLonCyLon:: London-based Cybersecurity Incubator – Start-Up Ventures: Ripjar, Cyberlytic, Digital Shadows, Intruder, AimBrain, Mentat Innovations, and Surevine •• Norse Corporation:Norse Corporation: San Francisco Venture focused upon global real-time cyber threat monitoring & Analytics.
  • 33. DarktraceDarktrace Cyber Intelligence PlatformCyber Intelligence Platform 33 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 34. 34 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Web:Web: www.darktrace.com/industrieswww.darktrace.com/industries DARKDARKTRACETRACE
  • 35. LogRhythmLogRhythm:: Security IntelligenceSecurity Intelligence 35 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Corporate Web:Corporate Web: www.LogRhythm.comwww.LogRhythm.com
  • 36. Norse Corporation:Norse Corporation: Intelligence ServiceIntelligence Service 36 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation
  • 37. GlobalGlobal “Real“Real--Time”Time” DarkNetDarkNet CyberAttacksCyberAttacks 37 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation 2020thth June 2014 :June 2014 : GlobalGlobal CyberAttacksCyberAttacks @@ “Speed of Light”“Speed of Light”
  • 38. “Smart Analysis Tools”“Smart Analysis Tools”:: 4D Simulation Modelling4D Simulation Modelling for Hybrid Terror Alert & Disaster Managementfor Hybrid Terror Alert & Disaster Management 38 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 39. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 44 –– AdvancedAdvanced Cyber Scenarios and AnalysisCyber Scenarios and Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 39 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 44 –– AdvancedAdvanced Cyber Scenarios and AnalysisCyber Scenarios and Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 40. AdvancedAdvanced Cyber ScenariosCyber Scenarios & Analysis& Analysis •• Insider Security Threats:Insider Security Threats: Adaptive Modelling & Learning provides early alert to unusual cyber behavioural such as remote logons, data downloads, finance transfers & malicious access. •• Zero Day & APTs:Zero Day & APTs: Traditional Cyber Tools are 40 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Zero Day & APTs:Zero Day & APTs: Traditional Cyber Tools are weak with sudden attacks, whilst real-time AI tools can provide instant management alerts. •• Securing the “Internet of Things”:Securing the “Internet of Things”: The IoT can only be effectively secured through distributed AI-based self-organising & adaptive security tools.
  • 41. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 41 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 55 –– HybridHybrid 2020ththC & 21C & 21ststC Cyber SolutionsC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 42. Hybrid 20Hybrid 20ththC & 21C & 21ststCC Cyber SolutionsCyber Solutions • Effective 21stC Enterprise Cybersecurity requires CSOs to deploy Hybrid SolutionsHybrid Solutions: –– Physical SecurityPhysical Security – Perimeter, Access Controls, CCTV, Biometrics, Staff Profiling & Vetting –– Traditional Cyber ToolsTraditional Cyber Tools – Firewalls, Anti-Virus, DDOS Alerts, & Malware & Adware Protection 42 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference & Malware & Adware Protection –– Advanced Cyber ToolsAdvanced Cyber Tools – AI-based Network & User Behaviour Modelling (Enterprise Immune System) •• New GenerationNew Generation Intelligent “Cyber” Tools will evolve during the next 5 to 10 years for “Smart Security”“Smart Security” – We define ““CyberVisionsCyberVisions”” for 20202020 (5 years - Integrated), 20252025 (10 Years - Adaptive) and 20402040 (25 Years - Neural) .
  • 43. Hybrid 21Hybrid 21ststC Organisation:C Organisation: Hierarchical & OrganicHierarchical & Organic •• TransitionTransition from 19thC/20thC to 21stC Business & Governance requires fundamental re-structuring of operations: –– 1919ththC /20C /20ththC Industrial Organisations:C Industrial Organisations: Hierarchical Bureaucracies (Pyramids) to process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer Business & Agencies with data processed in cyber clouds 43 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Business & Agencies with data processed in cyber clouds •• Living SystemsLiving Systems, such as mammals, use hybrid organisation of their extended nervous system (brain & body) to optimise real-time learning and environmental adaptation •• Smart Security SolutionsSmart Security Solutions will also require hybrid organisation to optimise real-time response to cyber & physical attacks.
  • 44. Smart SecuritySmart Security based upon AI & Machinebased upon AI & Machine Learning will span ALLLearning will span ALL Economic SectorsEconomic Sectors (1) Banking and Financial Services (2) Healthcare and Social Welfare (3) ICT, Mobile and Telecommunications (4) Education and Research (5) Manufacturing & Logistics 44 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference (5) Manufacturing & Logistics (6) Retail and Distribution (7) Central & Regional Government .....ALL.....ALL Economic SectorsEconomic Sectors will eventually require embeddedwill eventually require embedded ”smart security””smart security” in order to provide realin order to provide real--time resilience totime resilience to simultaneous physical & cyber attacks, crime or terrorism.simultaneous physical & cyber attacks, crime or terrorism.
  • 45. “Smart Security”“Smart Security” -- Banking and FinanceBanking and Finance • For each economic sector we’ll begin by analysing each of the critical sectors in the context of the Smart Genetic Design Principles of “Decisions” and “Learning”, and then discuss the implications for upgraded Smart Security and Governance: –– Smart Decisions:Smart Decisions: •• GeoGeo--Location:Location: Smart Mobile Banking, with GPS Location to provide suggestions for shopping (based on profile), cafes, restaurants, nearby on-line friends… •• RealReal--Time:Time: Financial & Commodity Trading, on-line share dealing, maximise interest rates, foreign exchange dealing. Banking has really pioneered “real-time” financial trading & networking during last 30 years! •• Knowledge Lens:Knowledge Lens: Deep Data Mining, Business Intelligence2.0 and CRM (Customer Relationship Management for Banking & Investment Clients –– Smart Learning:Smart Learning: 45 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Smart Learning:Smart Learning: •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Investment Banks have pioneered applications of Smart Neural Network Apps, Adaptive Trading and Real-Time Risk Management. •• Massive Memory & Storage:Massive Memory & Storage: Secure Resilient Databases are Fundamental to Banking •• Scalable Architecture:Scalable Architecture: Banks are moving from “bricks & mortar” to global scalable networks, and most now provide mobile & home banking “apps” and highly secure on-line account services –– Smart Sustainable SecuritySmart Sustainable Security Encryption, Portable Pin Pads, Biometrics, Cyber Risk Management –– Smart Governance, Management and Operations :Smart Governance, Management and Operations : Data Integrity, Compliance & Audit, New Financial Regulations
  • 46. “Smart Security”“Smart Security” –– Healthcare & Social WelfareHealthcare & Social Welfare –– Smart Decisions:Smart Decisions: •• GeoGeo--Location:Location: GPS Location for Medical Emergencies, Patient Images, Crisis Management, Ambulance Routing, Regional Social Support •• RealReal--Time:Time: On-Line Telemedicine Consultation & Preliminary Diagnosis. Also Smart Support during Intensive Hospital Surgery •• Knowledge Lens:Knowledge Lens: Filtering & Analysing Complex 3D Medical Scan Images, as well as future Data Mining for On-Line Patient Records –– Smart Learning:Smart Learning: •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Challenging Medical Research in New 46 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Challenging Medical Research in New Treatments for Cancer & Neural Diseases through Global Partnerships •• Massive Memory & Storage:Massive Memory & Storage: Design, Analysis and extensive Patient Trials of New Pharmaceutical Drugs, including new “Smart Drugs” •• Scalable Architecture:Scalable Architecture: National professional support network for both social welfare as well as citizen health, diagnosis and treatments –– Smart Security:Smart Security: Cybersecurity & Personal Privacy for Patient Records, as well as integrated security for hospitals, medical assets, drugs & social welfare facilities –– Smart Governance:Smart Governance: Professional Government Support, Management & Funding for National Medical & Social Welfare Services
  • 47. “Smart Security”“Smart Security” -- ICT, Mobile & TelecommunicationsICT, Mobile & Telecommunications –– Smart Decisions:Smart Decisions: •• GeoGeo--Location:Location: Local Mobile Information – Maps, Satellite Imagery, Climate, Geology, History, On-Line Persons on Smart Devices. •• RealReal--Time:Time: Financial Transactions, ePayments, eGovernment Services, IM, Social Media, MMORG and Immersive Virtual Worlds •• Knowledge Lens:Knowledge Lens: Global Data & Information can be filtered and focused for Local Decisions with ICT enabled “Knowledge Lens” –– Smart Learning:Smart Learning: 47 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Smart Learning:Smart Learning: •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Mobile, Wireless & Cellular Ad-Hoc Networks use adaptive routing & roaming protocols •• Massive Memory & Storage:Massive Memory & Storage: ICT provides the essential Smart Storage & Processing Tools including System Virtualisation & Cloud Computing •• Scalable Architecture:Scalable Architecture: Fundamental for smart ICT systems that already scale from nano machines to global search & social media “apps” –– Smart Security:Smart Security: Cybersecurity needs to be embedded EVERYWHERE! –– Smart Governance:Smart Governance: ICT requires new laws, regulations & governance
  • 48. “Smart Security”“Smart Security” -- Education & ResearchEducation & Research –– Smart Decisions:Smart Decisions: •• GeoGeo--Location:Location: Mobile Education, Navigation & Mapping, Augmented & Immersive Reality based on Geo-Location with Mobile Devices & Headsets •• RealReal--Time:Time: Networked Laboratories for Synchronised Parallel Research in Genetics, High-Energy Physics, Optical & Radio-Astronomy •• Knowledge Lens:Knowledge Lens: Smart Grid Computing with In-Depth Data Mining in search for New Particles in CERN LHC Collider. –– Smart Learning:Smart Learning: 48 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Smart Learning:Smart Learning: •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Virtual On-Line Colleges for remote students. Collaborative academic & commercial Techno Parks & Labs •• Massive Memory & Storage:Massive Memory & Storage: Crowd Sourced Volunteer PC Research as in the SETI Project (BOINC – Berkeley Open Net Computing) •• Scalable Architecture:Scalable Architecture: Business Opportunities for Global Niche College for minority study & research themes. Study courses on mobile “apps”! –– Smart Security:Smart Security: College Campus & Laboratory Cyber & Physical Security –– Smart Governance:Smart Governance: Rigorous Educational Data Audit & Compliance Regime
  • 49. “Smart Security”“Smart Security” -- GovernmentGovernment –– Smart Decisions:Smart Decisions: •• GeoGeo--Location:Location: Tracking all government assets, physical & electronic documents and devices to reduce loss or corruption of information •• RealReal--Time:Time: Ensure that the government ALWAYS has complete real-time info on its resources, staff and financial & political affairs •• Knowledge Lens:Knowledge Lens: “In-Depth” Smart Data Mining to link Government Databases relating to ALL Government Ministries & Agencies –– Smart Learning:Smart Learning: •• Adaptation & SelfAdaptation & Self--Organisation:Organisation: Flexible Networked Government Organisations and Operations to respond to evolving national & international events, policies & overall 49 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Operations to respond to evolving national & international events, policies & overall business & political environment •• Massive Memory & Storage:Massive Memory & Storage: Ability to store and analyse PetaBytes of Government Data relating to Programmes, Policies & Governance •• Scalable ArchitectureScalable Architecture: Efficient networked operational framework for the transparent management of national, region and local citizen programmes –– Smart Security:Smart Security: Implementation of integrated Physical and Cyber Security Operations according to International Standards – ISO/ITU –– Smart Governance:Smart Governance: Provision of Open eGovernment Portal supporting ALL major Ministries, Agencies and Partners for On-Line Transaction Processing & Analysis
  • 50. 1 – Background: 20th to 21stC Cybersecurity 2 – Cyber Players & Targets 3 – Recent 21stC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 66 –– Scenario 2020: Integrated SecurityScenario 2020: Integrated Security -- IoTIoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 50 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 66 –– Scenario 2020: Integrated SecurityScenario 2020: Integrated Security -- IoTIoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 51. OurOur CyberVisionsCyberVisions:: 2015 to 20402015 to 2040 •• ScenarioScenario 20202020 –– Integrated SecurityIntegrated Security--IoTIoT:: Managed Integration of IoT, Cyber & Physical Ops under CSO •• ScenarioScenario 20252025 –– Adaptive Security:Adaptive Security: Transition to 51 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• ScenarioScenario 20252025 –– Adaptive Security:Adaptive Security: Transition to Global Real-Time AI & ML Based Cyber Applications •• ScenarioScenario 20402040 –– Neural Security:Neural Security: Enterprise-Wide Deployment of Real-Time AI-Based Cyber Defences
  • 52. ScenarioScenario 2020:2020: Integrated SecurityIntegrated Security -- IoTIoT • ....5 Year Time Window - 2010 <2010 <–– 20152015 --> 2020> 2020 • Integrated CyberCyber--Physical SecurityPhysical Security deployed & managed by Board Level Chief Security Officer •• International StandardsInternational Standards for “IoT” APIs, Net Interface, Security Standards & Operations 52 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• International StandardsInternational Standards for “IoT” APIs, Net Interface, Security Standards & Operations •• Distributed SecurityDistributed Security for “Legacy”“Legacy” Network Assets & Devices for the “Internet of Things” • Trial Deployment of Advanced AIAdvanced AI--basedbased Intelligent & Adaptive Cybersecurity Tools
  • 53. Transition from 20Transition from 20ththC to 21C to 21ststCC Smart SecuritySmart Security •• Cybersecurity 2015Cybersecurity 2015--2020:2020: – Every country in the world will need to transition from the traditional 20thC culture & policy of massive physical defence to the connected “neural” 21stC world of in-depth intelligent & integrated cyber defence solutions •• National Boundaries:National Boundaries: – Traditional physical defence and geographical boundaries are still strategic national assets , but they need to be augmented through integrated cyber defence organisations & assets. 53 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference defence organisations & assets. •• Critical National Information Infrastructure:Critical National Information Infrastructure: – 21stC national economies function electronically, & yet they are poorly defended in cyberspace, and very often open to criminal & political attacks •• MultiMulti--Dimensional Cyber Defence:Dimensional Cyber Defence: – Nations need to audit their critical infrastructure – government, banks, telecommunications, energy, & transport – and to upgrade to international cybersecurity standards based upon accepted “best practice” (ISO/IEC)
  • 54. EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020 54 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 55. Cyber 2020 Visions:Cyber 2020 Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton and The Australian Government (Defence)and The Australian Government (Defence) 55 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 56. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 56 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 77 –– ScenarioScenario 2025: Self2025: Self--Adaptive SecurityAdaptive Security 8 – Scenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 57. ScenarioScenario 20252025:: SelfSelf--Adaptive SecurityAdaptive Security • ..10 Year Time Window - 2005 <2005 <–– 20152015 --> 2025> 2025 • Transition & Full Deployment of Enterprise- Wide AI-based SelfSelf--AdaptiveAdaptive “Cyber” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net 57 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both traditional & advanced AI-based “Cybersecurity Tools”
  • 58. CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios *** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon *** 58 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 59. 59 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Microsoft 2025:Microsoft 2025: Cyberspace ScenariosCyberspace Scenarios
  • 60. Technology Visions:Technology Visions: ScenarioScenario 20252025 60 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
  • 61. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 61 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20 C & 21 C Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 88 –– Scenario 2040: Neural SecurityScenario 2040: Neural Security 9 – YOUR Action Plan for Advanced Cyber!
  • 62. ScenarioScenario 2040:2040: Neural SecurityNeural Security • ..25 Year Time Window - 1990 <1990 <–– 20152015 --> 2040> 2040 • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI-based Cyber Event, Traffic & User Modelling 62 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become ultra-intelligent – “Neural Security”“Neural Security” .
  • 63. 1984: “Birth” of Intelligent Networks1984: “Birth” of Intelligent Networks andand “Death” of Personal Privacy“Death” of Personal Privacy ?? 63 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 64. -- City Business SystemsCity Business Systems –– British TelecomBritish Telecom –– Launch of RealLaunch of Real--Time Financial Trading:Time Financial Trading: 19841984 64 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 65. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 65 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Algorithmic Computer Trading using Real-Time Neural Nets & Statistical Maths Tools have been used for 20+ Years! .....Now they are being applied to provide intelligent real-time forecasts for enterprise cybersecurity threats!
  • 66. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 66 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 67. Smart Workplace:Smart Workplace: 20402040 –– Johnson ControlsJohnson Controls 67 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 68. Scenario 2040: CyberScenario 2040: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 68 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 69. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense:: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 69 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 70. BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040 70 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 71. Our Cybersecurity Industry 25 Year Challenge:Our Cybersecurity Industry 25 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 71 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
  • 72. 1 – Background: 20th to 21stC Cybersecurity 2 – AI & Machine Learning as Cyber Tools 3 – Recent 21stC Cybersecurity Ventures 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 2121ststC Cybersecurity (2)C Cybersecurity (2) –– “AI & Machine Learning”“AI & Machine Learning” 72 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 – Advanced Cyber Scenarios & Analysis 5 – Hybrid 20thC & 21stC Cyber Solutions 6 – Scenario 2020: Integrated Security - IoT 7 – Scenario 2025: Self-Adaptive Security 8 – Scenario 2040: Neural Security 99 –– YOURYOUR Action Plan for Advanced Cyber!Action Plan for Advanced Cyber!
  • 73. 1990 <1990 <–– 20152015 ––> 2040:> 2040: Next 25 YearsNext 25 Years •• IoT:IoT: Global Connected “Internet of Things” – All On-Line Intelligent Devices across ALLALL sectors & geographies. •• “The Bad Cyber Guys” :“The Bad Cyber Guys” : Professionally Trained Cyber Criminals and Cyber Terrorists operating World Wide! •• Augmented Reality:Augmented Reality: Emergence & Full Deployment of 4D Immersive Virtual Augmented Reality (a la Matrix Movies(a la Matrix Movies) •• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in 73 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in ALL intelligent devices, servers, data & network nodes •• OnOn--LineLine CyberPoliceCyberPolice:: Cyber Bot Avatars patrolling as Virtual Cyber Police Force across “Internet of Things”“Internet of Things” .....Meet the Long Term Challenge of Deploying AI & Machine Learning Based Cybersecurity Tools across YOUR Enterprise!YOUR Enterprise!
  • 74. YOUR Action Plan forYOUR Action Plan for Advanced “Cyber”!Advanced “Cyber”! •• Action 1:Action 1: Board-Level Review & Audit of current Cybersecurity Tools & Operations – 60 days •• Action 2:Action 2: Highlight security issues & insecure legacy net assets, devices & processes – 30 days •• Action 3:Action 3: Develop Multi-Year Plan, Budget & 74 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Action 3:Action 3: Develop Multi-Year Plan, Budget & Roadmap for Advanced “Cyber” to include: a) Cyber-Physical Operational Integration b) IoT Security for both Legacy & New Assets c) Training and Testing of AI-based “Cyber” Tools.
  • 75. “Real“Real--Time Defence”Time Defence” for Alien Invaders”for Alien Invaders” A.I. & Machine LearningA.I. & Machine Learning Cybersecurity Tools willCybersecurity Tools will ProvideProvide “Speed of Light”“Speed of Light” RealReal--Time Defence againstTime Defence against 75 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference RealReal--Time Defence againstTime Defence against “DARK”“DARK” Threats &Threats & Attacks!Attacks! “Steam Powered Birds arrive over our Cities! - 1981 Pen & Ink Drawing by Alexander RimskiAlexander Rimski--KorsakovKorsakov
  • 76. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 76 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 77. EastEast--West Security ConferenceWest Security Conference –– Spain2015Spain2015 -- 2121ststCC CyberTrendsCyberTrends Presentation Slides (PDF)Presentation Slides (PDF) -- 77 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download Link:Download Link: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/ Theme (1)Theme (1) –– “Integrated Security”“Integrated Security” Theme (2)Theme (2) –– “Advanced Cybersecurity“Advanced Cybersecurity”
  • 78. *** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing *** SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres 78 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet... 15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes killedkilled in Avalanchein Avalanche »»
  • 79. Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents 79 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 80. Cybersecurity Trends (Cybersecurity Trends (2): AI & Machine Learning2): AI & Machine Learning International EastInternational East--West Security Conference: Spain, ItalyWest Security Conference: Spain, Italy Cybersecurity Trends (Cybersecurity Trends (2): AI & Machine Learning2): AI & Machine Learning International EastInternational East--West Security Conference: Spain, ItalyWest Security Conference: Spain, Italy 80 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
  • 81. Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ 81 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 82. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 82 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 83. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 83 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1stst Class Honours Degree in Mathematics (BristolClass Honours Degree in Mathematics (Bristol University) & PhD from Cambridge University in SelfUniversity) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) , and hisOrganising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2016 Editions2016 Editions.
  • 84. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 84 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download:Download: www.valentina.net/DigiTec2012/
  • 85. Cybersecurity Trends (1) : “Integrated Security”Cybersecurity Trends (1) : “Integrated Security” International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain 85 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 86. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 86 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists!
  • 87. 87 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
  • 88. 21stC Architectures for Smart Business Sectors21stC Architectures for Smart Business Sectors • We can also design new economic architectures using our Smart Design Principles & then customise sector by sector. We focus upon adaptation, scaling, massive data, & network transparency: –– Education & Research:Education & Research: Transition from Monolithic to Niche Networks –– HealthCare & Social Welfare:HealthCare & Social Welfare: Telemedicine for towns & villages –– Banking & Finance:Banking & Finance: “Real-Time” financial & commodity trading –– Transportation:Transportation: Smart Airports, Roads and Transportation Services –– ICT Infrastructure:ICT Infrastructure: Launch 3G/4G Mobile Networks, and maximise Internet 88 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– ICT Infrastructure:ICT Infrastructure: Launch 3G/4G Mobile Networks, and maximise Internet Services, Local Wireless Hubs & eGovernance across all supported Regions –– National Security & DefenceNational Security & Defence:: Both for Physical Borders & CyberSpace –– Travel & Tourism:Travel & Tourism: Major opportunities for on-line bookings & marketing –– Energy & Utilities:Energy & Utilities: Secure Management of National Energy & Utility Grids •• Tomorrow morning we’ll explore the practical design requirements ofTomorrow morning we’ll explore the practical design requirements of Smart Security Solutions for Critical National Infrastructure (CNI) .....Smart Security Solutions for Critical National Infrastructure (CNI) .....
  • 89. 2121ststC Smart Models for BusinessC Smart Models for Business • From 1980s onwards, many Enterprises started to deploy ICT networks, and then to “flatten” their organisations from Hierarchical to Hybrid. • In the 21stC, Business is now starting to fully deploy more advanced ICT Solutions using the “Smart Design Principles”“Smart Design Principles” that we summarise below: –– SpaceSpace--Time Awareness:Time Awareness: Utilise GPS Location and RFID Technologies to Track and Trace both Products, Staff and all moveable Business Assets to provide Real-Time Corporation –– AdaptationAdaptation to Markets, New Product Features, Delivery Logistics, Minimise Stock Levels –– Massive Memory & Storage:Massive Memory & Storage: Low Cloud Storage Costs permit massive data mining on 89 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Massive Memory & Storage:Massive Memory & Storage: Low Cloud Storage Costs permit massive data mining on customer orders, profiles, search and buying behaviours. Already used by major international supermarket chains & global on-line players such as Amazon, eBay, Google. –– Sustainable Security :Sustainable Security : Integrated adaptive management of cyber and physical security –– SelfSelf--OrganisationOrganisation:: Empower staff for Local Decisions with almost “Flat Organisation” –– Scalable ArchitectureScalable Architecture:: Building Business as Cellular Organisation using High-Speed Nets –– Systems Integration:Systems Integration: Many Businesses need to integrate their on-line cyber & traditional physical operations to provide a integrated & coherent cyber-physical managed operation ...Now for examples of smart systems...Now for examples of smart systems –– “Self“Self--Organisation” & “Scalability” in scienceOrganisation” & “Scalability” in science
  • 90. Cyber “Genes” forCyber “Genes” for Smart SystemsSmart Systems • Intelligent Systems, either Artificial or Organic – Living Systems - are based on just a few shared common principles that include: 1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks 2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 4)4) Sustainable Security :Sustainable Security : Embedded Smart Security – Everywhere! 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale 90 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale in space & time from micro cells to macro solutions 6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from Social Networks, Search & On-Line Commerce 7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations ……Advanced ICT Solutions now provide ALL these “Genetic” Functions……Advanced ICT Solutions now provide ALL these “Genetic” Functions which will enable us to designwhich will enable us to design Smart CyberSmart Cyber--Physical Security SolutionsPhysical Security Solutions
  • 91. Smart SecuritySmart Security –– “Design Toolkit”“Design Toolkit” • The plan is now to apply the Smart Decision and Learning “Genes” as the design tools for critical economic sectors such as Banking, Energy & Defence –– Smart Decision “DSmart Decision “D--Genes” :Genes” : Spatial Geo-Location, Real-Time Operations, & Transforming Data to Decision through “Knowledge Lens” –– Smart Learning “LSmart Learning “L--Genes”:Genes”: Adaptation, Self-Organisation, Scalable Architecture and Massive Memory & Data Storage 91 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Architecture and Massive Memory & Data Storage –– Smart Sustainability:Smart Sustainability: Joint Operations for Cyber & Physical Security –– Smart Governance:Smart Governance: On-Line eGovernment Services together with new Laws, Legislation & Regulations for Cybercrime, eCommerce & Privacy …..Together these Smart Principles form our…..Together these Smart Principles form our “Design Toolkit”!“Design Toolkit”!
  • 92. 92 “Advanced Enterprise Cybersecurity“Advanced Enterprise Cybersecurity –– Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” - Madrid, Spain: 26th – 27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility