SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
S e c u r i t y
E v o l v i n g I T
S e c u r i t y   
T h r e a t s &
S o l u t i o n s
Peter Cochrane
www.cochrane.org.uk
t h e    d a r k    s i d e   
I s n o t g o i n g a w a y a n y t i m e s o o n !
• Their numbers and strengths are growing
• They always seem to be on the front foot
• They always seem to be ahead of the game
• They appear to be getting more adaptable
• They appear to be getting more agile
• Threats are growing
• Attacks are continuous
• The types are more varied
• Damage costs are accelerating
h o w    c o m e    ?
• They are driven by the economics of criminal success
• They are not managed by a board or committee
• They are not bound by ethics, laws and rules
• They enjoy the advantage of surprise
• Attacking is more fun than defending
• They are distributed, highly flexible and adaptable
• The threat and penalties of failure are extremely low
• Adopting and trying new technologies on the fly is their norm
a n d    m o r e    !   
B e yo n d t e c h n o l o g y a n d s k i l l
• They adopted open and sharing everything first
• They adopted mobility and mobile working first
• They started using clouds and dark nets first
• They employed distributed computing first
• They adopted and developed apps first
• They adopted Be My Own Boss first
• T h ey a d o p t e d BYO B f i r s t
• The are now federating resources and trading skills
• They are now employing outsourcing and insourcing
• Individuals and indiviual teams are selling specific skill sets
C o r r u p t i o n    !   
Human rel ationshi p s o p e n d o o r s
• In need of love
• In need of care
• In need of money
• Prone to bribery
• Needy of support
• In debt
• +++
Targeted individuals
and organisations
easy to influence
and infiltrate
with no easy
detection or
defence +++
i n f i l t r at i o n    !   
Te c h n o l o g y i s n o t t h e o n l y w a y i n
• External services people
• Visiting trades and repair crews
• Unauthorised info focussed visits
• Hardware/software plants in equipment
• Memory sticks in rest rooms
• +++
Open
Screens
Open
Access
Paper
Notes
Open Desks
Telephone
Numbers
Namers
Contacts
Data Devices
urls
• Carless and loud discussions
• Open screens readily visible
• Poor security of devices
• Shoulder surfing
o p p o r t u n i s t i c    !   
P e o p l e a n d t e c h n o l o g y a v a i l a b i l i t y
• Careless PIN and PassWord use
• Devices left unguarded
• Open phone and SMS
• Paper notes
H u n t i n g    I N    pa c k s      
Far more powerful and effective than individuals
• Team work is the new mode
• Rapid sharing is the key advantage
• Skill sharing and real time learning
• High speed adaptability a prime ability
• Results based reward system a key driver
• Team work is the new mode
• Rapid sharing is the key advantage
• Skill sharing and real time learning
• High speed adaptability a prime ability
• Results based reward system a key driver
H a c k e r    N e t s   
Dynamic aggregation of global assets
Sharing Trumps Need to Know
M u t e d    g o o d   
Almost zero sharing of anything !
Need to Know Culture Disabling
• Commercial confidence/secrets
• Government protecting national good
• Solutions sold and traded not shared
• Companies limping along in ignorance
• Specialist companies protecting markets
• Individuals unknowingly exposed to risks
• Exact damage caused is often undisclosed
e c o n o m i c s    o f    s h a r i n g   
When the cost gets too great organisation have to share
• Hakers have upper hand
• Retrospective solutions only
• Software requires regular updates
• Machines need regular security scans
• Most people are unaware and exposed
• Infections spread rapidly and go undetected
• File sharing apps are popular but very risky
• All machines come out of their box on day one infected
• We can broadly assume that there are no clean devices
• It is all a ticking time bomb !
Good
Bad
>> 3:1
Sufficient for good to prevail over bad !
But ‘bad’ shares resources and knowledge
Whilst ‘good’ operates by ‘need to know’
Sharing knowledge and resources is vital
to assure success !
Best estimate assuming equally
good people and technical
resources on both side of the line:
resourceS  
Ratio of aggregated good to bad
sharing  at  every  level  
An essential element necessary to secure a safe future
The future really
is in our hands -
we actually hold
all the ace cards
Identity  theft    
I t i s s o v e r y v e r y e a s y ! Lax security protocols and procedures
Spoof bank calls and paperwork
Big Data,Meta Data analysis
Bogus call centres/services
Spoof eMails,TXT, IMs
Government records
Institutional records
Face to face surveys
Social networking
Company pages
On-line surveys
Home pages
Data mining
Broader
Protection
N e c e s s a r y
Lax security protocols and procedures
Old technologies mixed with the new
Crack one item gives access to all ?
Crack one item to acces the network
Change/control all ownerships
Use ownership as collateral
Ownership affords validity
Viral step and repeat
Creates new crimes
Things as hostages
eBlackmail
+++
Broader
Protection
N e c e s s a r y
ownership  theft    
IoT rolled out at speed makes it even easier !
F I R E    WAL L S   
Old thinking and insufficient
• Easy to end run
• Easy to penetrate
• Difficult to maintain
• Easy to circumnavigate
• Demand high level expertise
• Only provide limited protection
• An impediment to sharing apps
• Inflexible for modern working
• Counter cultural to BYOD
• Slow to change/update
m a l wa r e    p r o t e c t i o n   
No satisfactory solutions available to date
• Hackers have upper hand
• Retrospective solutions only
• Software requires regular updates
• Machines need regular security scans
• Most people are unaware
• Infections spread rapidly
• File sharing apps is risky
• All machines come infected
• There are no clean devices
• It is all a ticking time bomb
P E O P L E    p r o t e c t i o n   
Unintended and Intended people based exposure
• Laxity
• Mistakes
• Gullibility
• Coercion
• Conspiracy
• Criminal acts
• Opportunistic acts
People are habitual and
conform to patterns of
regular behaviour
behaviou ral  An alysis  
Continuous monitoring of activities to detect anomalies
• Uploads and Downloads
• EMail attachment types
• Web Site addresses
• Networks accessed
• eMail addresses
• Device owneship
• Device type
• Home time
• Desk time
• Road time +++
Activities, Connections, Quantities, Timings
Axio matic  !    
T h e r e a r e n o s i l v e r b u l l e t s
If we do nothing new things will get worse
Non stop learning & adaptation required
Acting in isolation guarantees failure
Continual monitoring necessary
Machines action trumps humans
Networking and sharing are key
Early detection and action vital
Integrated security is a must
Localised quarantene vital
Every level to be protected
Every device proactive
All networks proactive
A New
Era For
Security
Nosingularsolutionsonlyamultiplicity
oftechniquestobeappliedinunison
Ax iom atic     
T i m e t o t h i n k a g a i n !
Scenarios for the age of everything on line
Mobile and Social Everything
Smart to Smart Everything
The Internet of Things
Clouds of Things
IntelligentThings
Repurposing
Recycling
Reuse
Apps on line
WiFi domination
Distributed storage
Clouds of things
The internet of things
More on-line than off
New working practices
More mobile than fixed
More connectivity modes
Thousands of Cloud Species
Far
Greater
Variability
a u t o    I m m u n e    s y s t e m s     
C a p a b l e o f d e t e c t i n g a n d i s o l a t i n g m a l w a r e
Hardware malware traps on every chip and card
And on every device, card, shelf, suit, floor, network
Also on all network elements & components
Soft malware traps in all code everywhere
Automatic experience/solution sharing
Fully automated response/reporting
Resource sharing and adaptation
Many variants & contributions
Evolution dominates design
Industry wide adoption
Full integration
Behaviour
Emmeregent
& Unpredictable
USING  a  multiplicity  of  channels  
Attack exposure and offset through access diversity
BlueTooth
Short Range
Device to Device
Device to Cloud
WiFi/WiMax
Medium Range
WLAN/Cloud
3, 4, 5, 6 G
Long Range
Device to Net
Device to Cloud
Integrated and intelligent
security apps embedded
into product/components
Attacks almost never occur on more than one channel at a time
Intercepting parsed information transmitted over many channels and modes extremely secure
Using more one
device also adds
security options
Automation/AI  essential  
D e m a n d s a r e w a y b e y o n d h u m a n s !
Continuous monitoring is a necessity
Getting it all right on the night is impossible
Rapid evolution & response are a required
Frustrating the enemy all the time
Integration of all available resources
Gathering all available intelligence
Analysing every aspect from both sides
Rapid response and repair an essential
Punitive responses and attacks an option?
War gaming the next moves to be built in
Open learning and solution dissemination
Human intervention should be the exception
Automation  and  AI  is  essential  
T h e d e m a n d s a r e w a y b e y o n d h u m a n a b i l i t i e s !
Thank
Y o u
cochrane.org.uk

Contenu connexe

Tendances

A STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and WellbeingA STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and WellbeingUniversity of Hertfordshire
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureUniversity of Hertfordshire
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourUniversity of Hertfordshire
 

Tendances (20)

A STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and WellbeingA STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and Wellbeing
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
 
HR practices and technology induced change
HR practices and technology induced changeHR practices and technology induced change
HR practices and technology induced change
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
 
Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
 
AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
 
Science and Engineering Out of The Box
Science and Engineering Out of The BoxScience and Engineering Out of The Box
Science and Engineering Out of The Box
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
Digital Destinies
Digital DestiniesDigital Destinies
Digital Destinies
 
Fibre broadband futures
Fibre broadband futuresFibre broadband futures
Fibre broadband futures
 
Patient Heal Thyself
Patient Heal ThyselfPatient Heal Thyself
Patient Heal Thyself
 
Telecom service futures driven by customer need
Telecom service futures driven by customer needTelecom service futures driven by customer need
Telecom service futures driven by customer need
 
AI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or SaviourAI Fables, Facts and Futures: Threat, Promise or Saviour
AI Fables, Facts and Futures: Threat, Promise or Saviour
 
Cim 4.0 7 nuggets of wisdom
Cim 4.0   7 nuggets of wisdomCim 4.0   7 nuggets of wisdom
Cim 4.0 7 nuggets of wisdom
 
Aux slide for session 1
Aux slide for session 1Aux slide for session 1
Aux slide for session 1
 
Aux slides for session 3
Aux slides for session 3Aux slides for session 3
Aux slides for session 3
 

Similaire à Evolving it security Threats and Solutions

Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Stephen Cobb
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousnessCiarán Mc Mahon
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVault
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yetLaura Bell
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 

Similaire à Evolving it security Threats and Solutions (20)

Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
IT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger PictureIT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger Picture
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Chapter2
Chapter2Chapter2
Chapter2
 

Plus de University of Hertfordshire

Plus de University of Hertfordshire (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Evolving it security Threats and Solutions

  • 1. S e c u r i t y E v o l v i n g I T S e c u r i t y   T h r e a t s & S o l u t i o n s Peter Cochrane www.cochrane.org.uk
  • 2. t h e   d a r k   s i d e   I s n o t g o i n g a w a y a n y t i m e s o o n ! • Their numbers and strengths are growing • They always seem to be on the front foot • They always seem to be ahead of the game • They appear to be getting more adaptable • They appear to be getting more agile • Threats are growing • Attacks are continuous • The types are more varied • Damage costs are accelerating
  • 3. h o w   c o m e   ? • They are driven by the economics of criminal success • They are not managed by a board or committee • They are not bound by ethics, laws and rules • They enjoy the advantage of surprise • Attacking is more fun than defending • They are distributed, highly flexible and adaptable • The threat and penalties of failure are extremely low • Adopting and trying new technologies on the fly is their norm
  • 4. a n d   m o r e   !   B e yo n d t e c h n o l o g y a n d s k i l l • They adopted open and sharing everything first • They adopted mobility and mobile working first • They started using clouds and dark nets first • They employed distributed computing first • They adopted and developed apps first • They adopted Be My Own Boss first • T h ey a d o p t e d BYO B f i r s t • The are now federating resources and trading skills • They are now employing outsourcing and insourcing • Individuals and indiviual teams are selling specific skill sets
  • 5. C o r r u p t i o n   !   Human rel ationshi p s o p e n d o o r s • In need of love • In need of care • In need of money • Prone to bribery • Needy of support • In debt • +++ Targeted individuals and organisations easy to influence and infiltrate with no easy detection or defence +++
  • 6. i n f i l t r at i o n   !   Te c h n o l o g y i s n o t t h e o n l y w a y i n • External services people • Visiting trades and repair crews • Unauthorised info focussed visits • Hardware/software plants in equipment • Memory sticks in rest rooms • +++ Open Screens Open Access Paper Notes Open Desks Telephone Numbers Namers Contacts Data Devices urls
  • 7. • Carless and loud discussions • Open screens readily visible • Poor security of devices • Shoulder surfing o p p o r t u n i s t i c   !   P e o p l e a n d t e c h n o l o g y a v a i l a b i l i t y • Careless PIN and PassWord use • Devices left unguarded • Open phone and SMS • Paper notes
  • 8. H u n t i n g   I N   pa c k s     Far more powerful and effective than individuals • Team work is the new mode • Rapid sharing is the key advantage • Skill sharing and real time learning • High speed adaptability a prime ability • Results based reward system a key driver
  • 9. • Team work is the new mode • Rapid sharing is the key advantage • Skill sharing and real time learning • High speed adaptability a prime ability • Results based reward system a key driver H a c k e r   N e t s   Dynamic aggregation of global assets Sharing Trumps Need to Know
  • 10. M u t e d   g o o d   Almost zero sharing of anything ! Need to Know Culture Disabling • Commercial confidence/secrets • Government protecting national good • Solutions sold and traded not shared • Companies limping along in ignorance • Specialist companies protecting markets • Individuals unknowingly exposed to risks • Exact damage caused is often undisclosed
  • 11. e c o n o m i c s   o f   s h a r i n g   When the cost gets too great organisation have to share • Hakers have upper hand • Retrospective solutions only • Software requires regular updates • Machines need regular security scans • Most people are unaware and exposed • Infections spread rapidly and go undetected • File sharing apps are popular but very risky • All machines come out of their box on day one infected • We can broadly assume that there are no clean devices • It is all a ticking time bomb !
  • 12. Good Bad >> 3:1 Sufficient for good to prevail over bad ! But ‘bad’ shares resources and knowledge Whilst ‘good’ operates by ‘need to know’ Sharing knowledge and resources is vital to assure success ! Best estimate assuming equally good people and technical resources on both side of the line: resourceS   Ratio of aggregated good to bad
  • 13. sharing  at  every  level   An essential element necessary to secure a safe future The future really is in our hands - we actually hold all the ace cards
  • 14. Identity  theft     I t i s s o v e r y v e r y e a s y ! Lax security protocols and procedures Spoof bank calls and paperwork Big Data,Meta Data analysis Bogus call centres/services Spoof eMails,TXT, IMs Government records Institutional records Face to face surveys Social networking Company pages On-line surveys Home pages Data mining Broader Protection N e c e s s a r y
  • 15. Lax security protocols and procedures Old technologies mixed with the new Crack one item gives access to all ? Crack one item to acces the network Change/control all ownerships Use ownership as collateral Ownership affords validity Viral step and repeat Creates new crimes Things as hostages eBlackmail +++ Broader Protection N e c e s s a r y ownership  theft     IoT rolled out at speed makes it even easier !
  • 16. F I R E   WAL L S   Old thinking and insufficient • Easy to end run • Easy to penetrate • Difficult to maintain • Easy to circumnavigate • Demand high level expertise • Only provide limited protection • An impediment to sharing apps • Inflexible for modern working • Counter cultural to BYOD • Slow to change/update
  • 17. m a l wa r e   p r o t e c t i o n   No satisfactory solutions available to date • Hackers have upper hand • Retrospective solutions only • Software requires regular updates • Machines need regular security scans • Most people are unaware • Infections spread rapidly • File sharing apps is risky • All machines come infected • There are no clean devices • It is all a ticking time bomb
  • 18. P E O P L E   p r o t e c t i o n   Unintended and Intended people based exposure • Laxity • Mistakes • Gullibility • Coercion • Conspiracy • Criminal acts • Opportunistic acts People are habitual and conform to patterns of regular behaviour
  • 19. behaviou ral  An alysis   Continuous monitoring of activities to detect anomalies • Uploads and Downloads • EMail attachment types • Web Site addresses • Networks accessed • eMail addresses • Device owneship • Device type • Home time • Desk time • Road time +++ Activities, Connections, Quantities, Timings
  • 20. Axio matic  !     T h e r e a r e n o s i l v e r b u l l e t s If we do nothing new things will get worse Non stop learning & adaptation required Acting in isolation guarantees failure Continual monitoring necessary Machines action trumps humans Networking and sharing are key Early detection and action vital Integrated security is a must Localised quarantene vital Every level to be protected Every device proactive All networks proactive A New Era For Security Nosingularsolutionsonlyamultiplicity oftechniquestobeappliedinunison
  • 21. Ax iom atic     T i m e t o t h i n k a g a i n ! Scenarios for the age of everything on line Mobile and Social Everything Smart to Smart Everything The Internet of Things Clouds of Things IntelligentThings Repurposing Recycling Reuse Apps on line WiFi domination Distributed storage Clouds of things The internet of things More on-line than off New working practices More mobile than fixed More connectivity modes Thousands of Cloud Species Far Greater Variability
  • 22. a u t o   I m m u n e   s y s t e m s     C a p a b l e o f d e t e c t i n g a n d i s o l a t i n g m a l w a r e Hardware malware traps on every chip and card And on every device, card, shelf, suit, floor, network Also on all network elements & components Soft malware traps in all code everywhere Automatic experience/solution sharing Fully automated response/reporting Resource sharing and adaptation Many variants & contributions Evolution dominates design Industry wide adoption Full integration Behaviour Emmeregent & Unpredictable
  • 23. USING  a  multiplicity  of  channels   Attack exposure and offset through access diversity BlueTooth Short Range Device to Device Device to Cloud WiFi/WiMax Medium Range WLAN/Cloud 3, 4, 5, 6 G Long Range Device to Net Device to Cloud Integrated and intelligent security apps embedded into product/components Attacks almost never occur on more than one channel at a time Intercepting parsed information transmitted over many channels and modes extremely secure Using more one device also adds security options
  • 24. Automation/AI  essential   D e m a n d s a r e w a y b e y o n d h u m a n s ! Continuous monitoring is a necessity Getting it all right on the night is impossible Rapid evolution & response are a required Frustrating the enemy all the time Integration of all available resources Gathering all available intelligence Analysing every aspect from both sides Rapid response and repair an essential Punitive responses and attacks an option? War gaming the next moves to be built in Open learning and solution dissemination Human intervention should be the exception
  • 25. Automation  and  AI  is  essential   T h e d e m a n d s a r e w a y b e y o n d h u m a n a b i l i t i e s ! Thank Y o u cochrane.org.uk