1. Finland,
a cyber threat preparedness forerunner?
Jyrki J.J. Kasvi
Parliament of Finland
TIEKE Finnish Information Society Centre
@jyrkikasvi
2. Cyber threats are old news
In 1982, CIA allegedly tampered with the software Soviet Union covertly
purchased from Canada to control their Trans-Siberian gas pipeline.
When put to use, the system allegedly produced intense pressure in the
pipeline, resulting in the largest man-made non-nuclear explosion in history.
Public Domain U.S. Air Force
5. Now cyber introduces digital threats to physical world
Digital Physical
Cyber
IoT
Threats
6. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 6
Modern cars include more than 85 controllers or mini-computers
communicating both with each other and the outside world.
In July 2015, researchers demonstrated how to control a Jeep Cherokee over the
Internet. Chrysler had to recall 1.4 million vehicles to patch the vulnerability.
We have been super lucky!
CC Wired / Andy Greenberg
7. A multi disciplinary challenge
A global challenge: Data security of Internet connected
automation systems has been demonstrated to be poor
E.g. in 2013, about 3000 Finnish industrial and real estate
automation systems were found to lack proper access controls
With IoT, connected sensors and automation systems are going
to become commonplace, requiring reliable and usable security
The same people responsible for our home wifi’s are going to install
our connected home automation systems too
Cyber/IoT security requires a combination of data security,
mobile technology, automation and usability competencies
A multi disciplinary approach is required.
6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 7
9. The global cyber challenge is a Finnish opportunity
Finnish data security cluster is very strong
SSH, F-Secure, Stonesoft, Blancco, Nixu, …
Finnish mobile technology cluster is still there
Especially mobile networks
Finnish automation and robotics cluster needs work
We are years behind competition
Finnish usability research is good but application poor
Our attitude towards end users definitely requires work
Public commitment and jurisdiction still weak
Minimalistic cyber threat monitoring and defence resources
Public authority jurisdictions not sufficient for the task at hand
Research and education requires bootstrapping
6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 9
10. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 10
Combining strengths with weaknesses
We need to rely on our strengths while we address our weaknesses in order
to build a Finnish cyber security cluster from these parts.
We need a cyber Commodore 64 to inspire our next generation.