SlideShare une entreprise Scribd logo
1  sur  56
4IR
Cyber Canaries Get Out of the Mine
philAgcaoili, CISM, CISSP, CRISC
SVP, U.S. Bank
SVP, Product & Security Innovation, ElavonApril 25, 2019
Never mind the gas,
it was automation that got
the canaries in the end.
2
Our Bright Future
3
4
5
What is an Industrial Revolution?
When there are major changes in...
Industry
It’s usually new ways of thinking and doing and new
technologies that cause the change to happen.
TransportationEconomy Society (social structure)
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
6
Number of Industrial Revolutions so far? 3
And we are now starting number 4.
It is changing...
4th Industrial Revolution
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
7
HEADING: 2030 COVFEFE
8
Source: Mymoena Ismail, NEMISA
9
HEADING: 2030 COVFEFE
10
Source: Mymoena Ismail, NEMISA
HEADING: 2030 COVFEFE
11
Source: Mymoena Ismail, NEMISA
HEADING: 2030 COVFEFE
Source: Mymoena Ismail, NEMISA
Mobile 5G / Cloud
Automation / AI
Advanced Robotics
IOT / Smart Factories
3D Printing
Energy Storage
12
What is Driving the 4th Industrial Revolution?
The fourth industrial revolution is the current and developing environment in which
disruptive technologies and trends are changing the way we live and work. The
factors include:
• The Internet of Things (IoT),
• Automation of Knowledge Work,
• Cloud Technology,
• 3D Printing,
• Advanced Robotics,
• Virtual Reality (VR),
• Next-Generation Genomics,
• Mobile Internet (5G networks),
• Energy Storage, and
• Artificial Intelligence (AI)
13
14
Source: Andrew McAfee
TEDxBoston 2012
4th Industrial Revolution
This affects social & economic sectors
Physical
Digital
Biological
What’s happening?
Different technologies are coming together
(convergence)
This is bringing different areas together
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
15
What is Already Happening?
Buying goods online
Paying bills online
Learning online – education
Listening to steaming music
Watching a streaming film
Playing an online game
Source: Mymoena Ismail, NEMISA
16Robotic surgery
What is Already Happening?
Different technologies coming together and
bringing different areas together
New products & services
with increased efficiency
(working better and faster)
for a better life
Order a taxi / ride share (Lyft) Book accommodation
17
What is Being Developed or New on the Market?
2017 PSB 5G Report
87% of respondents anticipate the emergence of new industries.
91% expect the invention of new products as well as services, not in existence as of yet.
85% expect the 5G connection to increase global competition among companies.
82% expect the growth of small businesses and stiffer global competition.
89% of the people surveyed expect greater productivity. 18
What is Being Developed or New on the Market?
Robotics
Drones
Artificial intelligence
Self
driving
cars
Virtual reality
3D printing
Internet of Things (IoT)
Bioengineering
Metadata & analytics
Digital currencies and blockchain
Quantum computing
Source: Mymoena Ismail, NEMISA
19
20
4IR is…
• Entrepreneurial
• Innovative
• Disruptive
• Evolving at an exponential rather than a linear pace
21
4IR Pluses and Minuses
Connection
Efficiency
Inability to change
Improve lives
People not ready and skilled
Not able to capture benefits
New opportunities Inequality may grow
See there are advantages and risks
Source: Mymoena Ismail, NEMISA
22
ALL industries and companies
are being impacted by this
DISRUPTION
23
4IR is Disruptive and Affects Everything
Focus on developing skills
We have to consider:
Based on partnerships across all
stakeholders.
Source: Mymoena Ismail, NEMISA
24
Influence curriculum
Critical thinking
Communication
Collaboration and teamwork
Complex problem solving
Creativity
Emotional intelligence
Global awareness
Financial, economic, business
and entrepreneurial literacy
Civic literacy
Health literacy
Environmental literacy
Computational thinking
Judgement and decision making
Service orientation
Negotiating
Cognitive flexibility
Influence approaches to
teaching & learning
New skills and
competencies required
Critical skills needed
Source: Mymoena Ismail, NEMISA
25
Understanding the systemUnderstanding the system
For over a decade, we have been talking about the
opportunities technology gives us...
A number of things were not known at the time More importantly the societal aspect was largely
missed
Today addressing youth unemployment & harnessing human innovation
forms part of the whole
to unlock effective citizen service delivery,
enhance customer experience
and bring about innovative solutions
for a better life for all
4
4
4
4
Source: Mymoena Ismail, NEMISA
26
The time is now to support
skills development.
27
Some threats and opportunities…
Some Threats and Opportunities…
Increase of mobile and
internet use comes with
own threats  Cybersecurity becomes a
massive global problem.
We need the e-skills to combat this.
Also fundamental to successful digital transformation.
Source: Mymoena Ismail, NEMISA
28
Avoiding Security Exceptionalism
29
4IR:ImpacttoSupplyChain
30
Cybersecurity Topics to Study Now!!!
…Actually 5 years ago
• Focus on getting hands on skills and experience with the 4IR factors
• Cybersecurity Specialization Areas:
• Cloud (AWS, Azure, GCP, etc.)
• Software Development
• Agile and DevOps
• ICT, IOT, and Smart Technology (consumer and industrial)
• Blockchain
• Automation, Data Sciences, Machine Learning, and AI
• Learning to identify Risks and Cyber Consequences of 4IR
• New Vulnerabilities through the 4IR Cybersecurity Supply Chain
31
Refresher:
4IR Factors for Further Cybersecurity Study
• The Internet of Things (IoT),
• Automation of Knowledge Work,
• Cloud Technology,
• 3D Printing,
• Advanced Robotics,
• Virtual Reality (VR),
• Next-Generation Genomics,
• Mobile Internet (5G networks),
• Energy Storage, and
• Artificial Intelligence (AI)
32
Transitioning from Traditional IT to the Future of IT
Enabling capabilities in an agile, rapid, self-service fashion that empowers technology organization to focus on
delivering business capabilities faster
Changing the OrganizationTraditional IT Future of IT
As a Service Provider As a Strategic Differentiator
IT Service Operations
Manual
Processes
Self-service
Portals
Pay-per-
Use
Approval
based
Functional
Silos
SLA-driven
Automated
Processes
Integrated IT
Ops Team
Application Development
Focused on
Technology Delivery
Waterfall
Development
Focused on Business Capability
Delivery
Conventional
Delivery
Agile
Development
Continuous
Delivery
Infrastructure Management
Multiple Physical
Data Centers
Scalable and
Flexible Capacity
Hybrid Cloud
Capabilities
Legacy, On-Premise
Infrastructure
Long Provisioning
Lead Times
Fixed Data Center
Capacity
Software-Defined
Data Centers
Rapid, Automated
Provisioning
Improved time-to-market
Anticipate business needs
Greater IT financial transparency
Increased developer productivity
Attract top technology talent
Lead through innovation
Provide fast and flexible services
Scaling to match varying workloads
Service delivery orchestration
Outcomes Enabled
Cloud Technology
Container
Orchestration
OS
Storage
Network
Hardware
34
Automation
35
Automation
• Low-wage earners will be among the first to see their jobs
disappear, since many of their tasks are routine-based.
• Highly creative or technical positions are most likely to prevail,
along with personal care and domestic service jobs that
require interpersonal skills and emotional intelligence.
• Degrees appear to only be a partial shield against robots.
• Virtually ALL JOBS are going to begin to experience some
pressure from automation.
36
37
What tasks can be automated?
I’m asking you….
38
Software Development
39
The big takeaways for tech leaders:
Python, Ruby, and JavaScript are the most popular programming languages among software engineers.
Engineers who can code in Rust, Go, and Lua can be among the most technically proficient.
— Triplebyte, 2018
Software Development: Beyond “Shifting Left”
Source: Jeff Williams, Contrast Security
Five steps that greatly help:
Make developers responsible for testing
Code review quality checks
Teach testers to code
Use the same tools
Start with testability in mind
The first way of security: Establish security
work flow
41
Source: Jeff Williams, Contrast Security
The second way of security: Ensure instant
security feedback
42
Source: Jeff Williams, Contrast Security
The third way of security:
Build a Security Culture
• Many organizations struggle with a security culture centered on
blame, hiding, and uninformed strategy
• Key to DevSecOps culture
• Ensure that responsibility for security falls squarely on development teams
• Security experts should transform themselves into coaches and toolsmiths
• Focus for security is on teaching and automating as much as possible
• In DevSecOps, organizations strive to practice “security in sunshine”
and celebrate both vulnerabilities and attacks as a sign of good
security process and an opportunity to improve
• We are still in the early days of DevSecOps
43
Source: Jeff Williams, Contrast Security
Data Science and Machine Learning
A place to start: TOOLS for non-programmers
* Programming is an integral part of data science
44
Artificial Intelligence (AI) –
Deep Learning and its applications
• Trend Prediction
• Recognition
• New Knowledge
• Making Sense
• Replace Human
• Information retrieval (search engines)
• Pattern recognition
• Audience targeting
• Sentiment analysis (based on written
text)
• Personalization
• Automation
• Natural Language Processing
• Social media mining
• Organic search and content performance
• Brand and product differentiation
• Language Translation
• Speech Recognition
• Generating Handwriting
• Face Recognition
• Autonomous Driving
• Imitating Famous Painters
• Generating Music
• Generating Photos
*Not to be confused with AGI and ASI
45
AI
46
Source: Kate Crawford and Vladan Joler
47
Source: Kate Crawford and Vladan Joler
48
Source: Kate Crawford and Vladan Joler
49
AWS uses automated reasoning to achieve
security at scale
• Zelkova uses automated reasoning to analyze policies and the future consequences of
policies
• Tools include automated reasoners - Satisfiability Modulo Theories (SMT) solvers
• Zelkova has a deep understanding of the semantics of the IAM policy language and builds
upon a solid mathematical foundation
• S3 uses Zelkova to check each bucket policy and warns you if an unauthorized user is able
to read or write to your bucket
• AWS Config continuously audits AWS resource configurations and now includes Zelkova-
based managed rules such as s3-bucket-public-read-prohibited, s3-bucket-public-write-
prohibited, s3-bucket-server-side-encryption-enabled, s3-bucket-ssl-requests-only,
and lambda-function-public-access-prohibited
• AWS Trusted Advisor helps improve the security of your AWS environment, including
analyzing resource policies
• Amazon Macie uses machine learning to automatically discover, classify, and protect
sensitive data in AWS. It uses Zelkova to determine the accessibility of S3 buckets
• Amazon GuardDuty is a managed threat detection service that uses Zelkova
50
Mathematics for AI: Essential Math Topics
Essential lists of math topics for Machine Learning and Deep Learning:
• Linear Algebra
• Calculus
• Probability
• Optimization
https://towardsdatascience.com/mathematics-for-ai-all-the-essential-math-topics-you-need-ed1d9c910baf
https://www.quora.com/What-math-is-needed-for-artificial-intelligence-machine-learning-research-Is-it-
necessary-to-learn-everything-or-can-you-learn-just-the-specifics-such-as-matrix-multiplication
Example Cyber Activity Modeling:
Satisfiability Modulo Theories (SMT)
Semantic-Based Reasoning to Provide Meaningful Context in Human
Activity Recognizing 51
“Going forward, it will be important to
reinforce data gathering efforts in order
to more closely track the distributional
impacts of the current transformations.
This will make it possible to shape the
digital economy in a way that delivers
broadbased gains.”
Silja Baller, World Economic Forum
4IR Privacy
Considerations:
Data Gathering
and Aggregation
52
Collaboration for impact
4IR has lots of opportunities for innovation.
Innovation Opportunities
You need to have the digital skills (e-skills) to
make use of those opportunities.
You can be part of securing our future.
Source: Mymoena Ismail, NEMISA
53
54
It is not necessary to change.
Survival is not mandatory.
~W. Edwards Deming
55
Phil Agcaoili
Distinguished Fellow and Fellows Chairman, Ponemon Institute
Steering Committee, Financial Services –
Information Sharing & Analysis Center (FS-ISAC)
Payments Processing Information Sharing Council (PPISC)
Contributor, NIST Cybersecurity Framework
Co-Founder & Board Member, Southern CISO Security Council
Founding Member, Cloud Security Alliance (CSA)
Inventor & Co-Author
CSA Cloud Controls Matrix (ISO 27017/27018)
Security, Trust and Assurance Registry (STAR), and
CSA Open Certification Framework (OCF) – AICPA SOC 2
@hacksec
https://www.linkedin.com/in/philA
Thanks
56

Contenu connexe

Tendances

Industrial revolution 4.0
Industrial revolution 4.0 Industrial revolution 4.0
Industrial revolution 4.0 Aditya Randika
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energyBayu imadul Bilad
 
Work 4.0 _ The Industry 4.0 Digital Transformation
Work 4.0 _  The Industry 4.0 Digital TransformationWork 4.0 _  The Industry 4.0 Digital Transformation
Work 4.0 _ The Industry 4.0 Digital TransformationWg Cdr Jayesh C S PAI
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcjvivek joshi
 
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureinnovationoecd
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoTCisco Canada
 
Third Industrial Revolution
Third Industrial RevolutionThird Industrial Revolution
Third Industrial RevolutionRobin Teigland
 
Industry 4.0 | Daxue Consulting
Industry 4.0 | Daxue ConsultingIndustry 4.0 | Daxue Consulting
Industry 4.0 | Daxue ConsultingDaxue Consulting
 
Industry 4.0 Changes Everything
Industry 4.0 Changes Everything Industry 4.0 Changes Everything
Industry 4.0 Changes Everything Imaginet
 
Industry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasIndustry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasAman Jain
 
Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0Stacey Roberts
 
Advanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin kohAdvanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin kohColin Koh (許国仁)
 
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolutionUnderstanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolutionBlack Turtle Diginovation Pvt Ltd
 
Future of Higher Education June 2019
Future of Higher Education June 2019Future of Higher Education June 2019
Future of Higher Education June 2019Robin Teigland
 

Tendances (20)

Industrial revolution 4.0
Industrial revolution 4.0 Industrial revolution 4.0
Industrial revolution 4.0
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energy
 
Work 4.0 _ The Industry 4.0 Digital Transformation
Work 4.0 _  The Industry 4.0 Digital TransformationWork 4.0 _  The Industry 4.0 Digital Transformation
Work 4.0 _ The Industry 4.0 Digital Transformation
 
4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcj
 
CIM history and 4IR
CIM history and 4IRCIM history and 4IR
CIM history and 4IR
 
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secure
 
Health 4.0
Health 4.0Health 4.0
Health 4.0
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Third Industrial Revolution
Third Industrial RevolutionThird Industrial Revolution
Third Industrial Revolution
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0 | Daxue Consulting
Industry 4.0 | Daxue ConsultingIndustry 4.0 | Daxue Consulting
Industry 4.0 | Daxue Consulting
 
Industry 4.0 Changes Everything
Industry 4.0 Changes Everything Industry 4.0 Changes Everything
Industry 4.0 Changes Everything
 
Industry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasIndustry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi Nivas
 
Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0
 
Advanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin kohAdvanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin koh
 
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolutionUnderstanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
 
Future of Higher Education June 2019
Future of Higher Education June 2019Future of Higher Education June 2019
Future of Higher Education June 2019
 

Similaire à 4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMicrosoft India
 
RobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptxRobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptxssuserbd24b8
 
Into the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and ChallengesInto the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and ChallengesRobin Teigland
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next dgmAustralia
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 Brian Pichman
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfHi-Tech Institute
 
Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris PresentationYoussef Rahoui
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...Juha Hulkkonen
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Brian Pichman
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferRobin Teigland
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlAIIM International
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyKaali Dass PMP, PhD.
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxAdvance Tech
 

Similaire à 4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine (20)

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
RobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptxRobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptx
 
Into the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and ChallengesInto the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and Challenges
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdf
 
Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris Presentation
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School Comfer
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docx
 
Meeting with an entreprenuer
Meeting with an entreprenuerMeeting with an entreprenuer
Meeting with an entreprenuer
 

Plus de Phil Agcaoili

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for SecurityPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...Phil Agcaoili
 

Plus de Phil Agcaoili (20)

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
 

Dernier

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine

  • 1. 4IR Cyber Canaries Get Out of the Mine philAgcaoili, CISM, CISSP, CRISC SVP, U.S. Bank SVP, Product & Security Innovation, ElavonApril 25, 2019
  • 2. Never mind the gas, it was automation that got the canaries in the end. 2
  • 4. 4
  • 5. 5
  • 6. What is an Industrial Revolution? When there are major changes in... Industry It’s usually new ways of thinking and doing and new technologies that cause the change to happen. TransportationEconomy Society (social structure) The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 6
  • 7. Number of Industrial Revolutions so far? 3 And we are now starting number 4. It is changing... 4th Industrial Revolution The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 7
  • 8. HEADING: 2030 COVFEFE 8 Source: Mymoena Ismail, NEMISA
  • 9. 9
  • 10. HEADING: 2030 COVFEFE 10 Source: Mymoena Ismail, NEMISA
  • 11. HEADING: 2030 COVFEFE 11 Source: Mymoena Ismail, NEMISA
  • 12. HEADING: 2030 COVFEFE Source: Mymoena Ismail, NEMISA Mobile 5G / Cloud Automation / AI Advanced Robotics IOT / Smart Factories 3D Printing Energy Storage 12
  • 13. What is Driving the 4th Industrial Revolution? The fourth industrial revolution is the current and developing environment in which disruptive technologies and trends are changing the way we live and work. The factors include: • The Internet of Things (IoT), • Automation of Knowledge Work, • Cloud Technology, • 3D Printing, • Advanced Robotics, • Virtual Reality (VR), • Next-Generation Genomics, • Mobile Internet (5G networks), • Energy Storage, and • Artificial Intelligence (AI) 13
  • 15. 4th Industrial Revolution This affects social & economic sectors Physical Digital Biological What’s happening? Different technologies are coming together (convergence) This is bringing different areas together The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 15
  • 16. What is Already Happening? Buying goods online Paying bills online Learning online – education Listening to steaming music Watching a streaming film Playing an online game Source: Mymoena Ismail, NEMISA 16Robotic surgery
  • 17. What is Already Happening? Different technologies coming together and bringing different areas together New products & services with increased efficiency (working better and faster) for a better life Order a taxi / ride share (Lyft) Book accommodation 17
  • 18. What is Being Developed or New on the Market? 2017 PSB 5G Report 87% of respondents anticipate the emergence of new industries. 91% expect the invention of new products as well as services, not in existence as of yet. 85% expect the 5G connection to increase global competition among companies. 82% expect the growth of small businesses and stiffer global competition. 89% of the people surveyed expect greater productivity. 18
  • 19. What is Being Developed or New on the Market? Robotics Drones Artificial intelligence Self driving cars Virtual reality 3D printing Internet of Things (IoT) Bioengineering Metadata & analytics Digital currencies and blockchain Quantum computing Source: Mymoena Ismail, NEMISA 19
  • 20. 20
  • 21. 4IR is… • Entrepreneurial • Innovative • Disruptive • Evolving at an exponential rather than a linear pace 21
  • 22. 4IR Pluses and Minuses Connection Efficiency Inability to change Improve lives People not ready and skilled Not able to capture benefits New opportunities Inequality may grow See there are advantages and risks Source: Mymoena Ismail, NEMISA 22
  • 23. ALL industries and companies are being impacted by this DISRUPTION 23
  • 24. 4IR is Disruptive and Affects Everything Focus on developing skills We have to consider: Based on partnerships across all stakeholders. Source: Mymoena Ismail, NEMISA 24
  • 25. Influence curriculum Critical thinking Communication Collaboration and teamwork Complex problem solving Creativity Emotional intelligence Global awareness Financial, economic, business and entrepreneurial literacy Civic literacy Health literacy Environmental literacy Computational thinking Judgement and decision making Service orientation Negotiating Cognitive flexibility Influence approaches to teaching & learning New skills and competencies required Critical skills needed Source: Mymoena Ismail, NEMISA 25
  • 26. Understanding the systemUnderstanding the system For over a decade, we have been talking about the opportunities technology gives us... A number of things were not known at the time More importantly the societal aspect was largely missed Today addressing youth unemployment & harnessing human innovation forms part of the whole to unlock effective citizen service delivery, enhance customer experience and bring about innovative solutions for a better life for all 4 4 4 4 Source: Mymoena Ismail, NEMISA 26
  • 27. The time is now to support skills development. 27
  • 28. Some threats and opportunities… Some Threats and Opportunities… Increase of mobile and internet use comes with own threats  Cybersecurity becomes a massive global problem. We need the e-skills to combat this. Also fundamental to successful digital transformation. Source: Mymoena Ismail, NEMISA 28
  • 31. Cybersecurity Topics to Study Now!!! …Actually 5 years ago • Focus on getting hands on skills and experience with the 4IR factors • Cybersecurity Specialization Areas: • Cloud (AWS, Azure, GCP, etc.) • Software Development • Agile and DevOps • ICT, IOT, and Smart Technology (consumer and industrial) • Blockchain • Automation, Data Sciences, Machine Learning, and AI • Learning to identify Risks and Cyber Consequences of 4IR • New Vulnerabilities through the 4IR Cybersecurity Supply Chain 31
  • 32. Refresher: 4IR Factors for Further Cybersecurity Study • The Internet of Things (IoT), • Automation of Knowledge Work, • Cloud Technology, • 3D Printing, • Advanced Robotics, • Virtual Reality (VR), • Next-Generation Genomics, • Mobile Internet (5G networks), • Energy Storage, and • Artificial Intelligence (AI) 32
  • 33. Transitioning from Traditional IT to the Future of IT Enabling capabilities in an agile, rapid, self-service fashion that empowers technology organization to focus on delivering business capabilities faster Changing the OrganizationTraditional IT Future of IT As a Service Provider As a Strategic Differentiator IT Service Operations Manual Processes Self-service Portals Pay-per- Use Approval based Functional Silos SLA-driven Automated Processes Integrated IT Ops Team Application Development Focused on Technology Delivery Waterfall Development Focused on Business Capability Delivery Conventional Delivery Agile Development Continuous Delivery Infrastructure Management Multiple Physical Data Centers Scalable and Flexible Capacity Hybrid Cloud Capabilities Legacy, On-Premise Infrastructure Long Provisioning Lead Times Fixed Data Center Capacity Software-Defined Data Centers Rapid, Automated Provisioning Improved time-to-market Anticipate business needs Greater IT financial transparency Increased developer productivity Attract top technology talent Lead through innovation Provide fast and flexible services Scaling to match varying workloads Service delivery orchestration Outcomes Enabled
  • 36. Automation • Low-wage earners will be among the first to see their jobs disappear, since many of their tasks are routine-based. • Highly creative or technical positions are most likely to prevail, along with personal care and domestic service jobs that require interpersonal skills and emotional intelligence. • Degrees appear to only be a partial shield against robots. • Virtually ALL JOBS are going to begin to experience some pressure from automation. 36
  • 37. 37
  • 38. What tasks can be automated? I’m asking you…. 38
  • 39. Software Development 39 The big takeaways for tech leaders: Python, Ruby, and JavaScript are the most popular programming languages among software engineers. Engineers who can code in Rust, Go, and Lua can be among the most technically proficient. — Triplebyte, 2018
  • 40. Software Development: Beyond “Shifting Left” Source: Jeff Williams, Contrast Security Five steps that greatly help: Make developers responsible for testing Code review quality checks Teach testers to code Use the same tools Start with testability in mind
  • 41. The first way of security: Establish security work flow 41 Source: Jeff Williams, Contrast Security
  • 42. The second way of security: Ensure instant security feedback 42 Source: Jeff Williams, Contrast Security
  • 43. The third way of security: Build a Security Culture • Many organizations struggle with a security culture centered on blame, hiding, and uninformed strategy • Key to DevSecOps culture • Ensure that responsibility for security falls squarely on development teams • Security experts should transform themselves into coaches and toolsmiths • Focus for security is on teaching and automating as much as possible • In DevSecOps, organizations strive to practice “security in sunshine” and celebrate both vulnerabilities and attacks as a sign of good security process and an opportunity to improve • We are still in the early days of DevSecOps 43 Source: Jeff Williams, Contrast Security
  • 44. Data Science and Machine Learning A place to start: TOOLS for non-programmers * Programming is an integral part of data science 44
  • 45. Artificial Intelligence (AI) – Deep Learning and its applications • Trend Prediction • Recognition • New Knowledge • Making Sense • Replace Human • Information retrieval (search engines) • Pattern recognition • Audience targeting • Sentiment analysis (based on written text) • Personalization • Automation • Natural Language Processing • Social media mining • Organic search and content performance • Brand and product differentiation • Language Translation • Speech Recognition • Generating Handwriting • Face Recognition • Autonomous Driving • Imitating Famous Painters • Generating Music • Generating Photos *Not to be confused with AGI and ASI 45
  • 46. AI 46
  • 47. Source: Kate Crawford and Vladan Joler 47
  • 48. Source: Kate Crawford and Vladan Joler 48
  • 49. Source: Kate Crawford and Vladan Joler 49
  • 50. AWS uses automated reasoning to achieve security at scale • Zelkova uses automated reasoning to analyze policies and the future consequences of policies • Tools include automated reasoners - Satisfiability Modulo Theories (SMT) solvers • Zelkova has a deep understanding of the semantics of the IAM policy language and builds upon a solid mathematical foundation • S3 uses Zelkova to check each bucket policy and warns you if an unauthorized user is able to read or write to your bucket • AWS Config continuously audits AWS resource configurations and now includes Zelkova- based managed rules such as s3-bucket-public-read-prohibited, s3-bucket-public-write- prohibited, s3-bucket-server-side-encryption-enabled, s3-bucket-ssl-requests-only, and lambda-function-public-access-prohibited • AWS Trusted Advisor helps improve the security of your AWS environment, including analyzing resource policies • Amazon Macie uses machine learning to automatically discover, classify, and protect sensitive data in AWS. It uses Zelkova to determine the accessibility of S3 buckets • Amazon GuardDuty is a managed threat detection service that uses Zelkova 50
  • 51. Mathematics for AI: Essential Math Topics Essential lists of math topics for Machine Learning and Deep Learning: • Linear Algebra • Calculus • Probability • Optimization https://towardsdatascience.com/mathematics-for-ai-all-the-essential-math-topics-you-need-ed1d9c910baf https://www.quora.com/What-math-is-needed-for-artificial-intelligence-machine-learning-research-Is-it- necessary-to-learn-everything-or-can-you-learn-just-the-specifics-such-as-matrix-multiplication Example Cyber Activity Modeling: Satisfiability Modulo Theories (SMT) Semantic-Based Reasoning to Provide Meaningful Context in Human Activity Recognizing 51
  • 52. “Going forward, it will be important to reinforce data gathering efforts in order to more closely track the distributional impacts of the current transformations. This will make it possible to shape the digital economy in a way that delivers broadbased gains.” Silja Baller, World Economic Forum 4IR Privacy Considerations: Data Gathering and Aggregation 52
  • 53. Collaboration for impact 4IR has lots of opportunities for innovation. Innovation Opportunities You need to have the digital skills (e-skills) to make use of those opportunities. You can be part of securing our future. Source: Mymoena Ismail, NEMISA 53
  • 54. 54
  • 55. It is not necessary to change. Survival is not mandatory. ~W. Edwards Deming 55
  • 56. Phil Agcaoili Distinguished Fellow and Fellows Chairman, Ponemon Institute Steering Committee, Financial Services – Information Sharing & Analysis Center (FS-ISAC) Payments Processing Information Sharing Council (PPISC) Contributor, NIST Cybersecurity Framework Co-Founder & Board Member, Southern CISO Security Council Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author CSA Cloud Controls Matrix (ISO 27017/27018) Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) – AICPA SOC 2 @hacksec https://www.linkedin.com/in/philA Thanks 56

Notes de l'éditeur

  1. FutureCon Message about the future and the basic elements that are already here
  2. Enaex RoboMiner
  3. 1993 – Everyone should include computers (and Internet) in their work and daily life Different – Modems, Internet, slow, apps not smart, nothing inter-connected, computing slow, Windows 95/NT
  4. Electrification / sustainable energy batteries Cars Flying cars AI, ML, Data Sciences, Automation
  5. Change: Waterholes Rest stops Gas stations Charging stops How does this work/compete with Ride Sharing services? Insurance Car ownership Charging at home that’s smart and energy-efficient with solar Cyber consequences of: Always-connected GPS-integrated Summon Autonomous cars, trucks, vans, and buses
  6. https://ripple.com/insights/welcome-to-the-fourth-industrial-revolution/ Cyber-physical production systems (CPPS) is catch-all term for talking about the integration of smart, internet-connected machines and human labor. Factory managers are not simply reimagining the assembly line, but actively creating a network of machines that not only can produce more with fewer errors, but can autonomously alter their production patterns in accordance with external inputs while still retaining a high degree of efficiency.
  7. 5G can provide hundredfold increases in traffic capacity and network efficiency over 4G It has the transformative potential on the future of connectivity worldwide 1 ­– 10 gigabit per second connections made to endpoints located in the field. 1000x (one-thousand fold) bandwidth for a unit area. 1ms (millisecond) end-to-end round-trip delay. 10 – 100x number of devices with connection. Network coverage of 100%. Availability of 99.999%. 90% decrease in energy usage by network. As much as 10-year battery life for low power devices.
  8. Google Wing Google Hyundai VW Amazon Uber
  9. The spectacular growth of IoT, Data Sciences, Machine Learning, Deep Learning,, and AI Deep learning is a version of machine learning that uses artificial intelligence principles, such as pattern recognition or the automation of decision science to deliver actions such as driverless car driving IoT is about sensor data collected from various devices via an HTTP protocol, to be analyzed to automate various processes (warming up your home, turning the lights on and off) and generate alerts as needed  (when an oil well is about to experience big problems)
  10. Overall, the researchers found one-quarter of jobs in the U.S. are at "high-risk" of automation since 70 percent or more of their tasks could be done by machines. Another 36 percent of jobs are at "medium-risk" as a machine could do between 30 and 70 percent of their tasks. Some 40 percent of jobs are at "low-risk", with less than 30 percent of their tasks able to be performed by a robot.
  11. Recruitment will be impacted (office administration) - Algorithms are scanning resumes for desired keywords, and chat boxes arranged interviews with candidates
  12. The basic cycle of DevSecOps is to identify the most critical security challenge, implement a defense strategy, automate security testing for that defense, and then monitor and defend against attacks. Both our security pipeline and the security of our software gets stronger and stronger over time.
  13. The feedback loop shows instant feedback of both vulnerabilities and attacks to the teams that need them through the tools they are already using. A DevSecOps pipeline is the set of tools and processes that continuously performs security work as code is written, integrated, tested, deployed, and operated. Organizations should automate security as much as possible, and provide instant feedback to the team members that need it through the tools that they are already using. Security feedback must be designed for consumption by developers, testers, and executives that do not have extensive security expertise.
  14. Paxata is one of the few organizations which focus on data cleaning and preparation, and not the machine learning or statistical modeling part. It is a Microsoft Excel-like application that is easy to use.  Auto-WEKA is an open-source data mining software that’s an easy GUI based tool for beginners in data science. It is primarily used for educational and academic purposes for now. DataRobot is a highly automated machine learning platform MLBase is an open-source project. The core idea behind it is to provide an easy solution for applying machine learning to large scale problems. RapidMiner covers the entire life-cycle of prediction modeling, starting from data preparation to model building and finally validation and deployment. h2o.ai Driverless AI is an enterprise-class automatic machine learning platform. It’s available as a docker image Very intuitive interface trains on datasets to give excellent results on par with a good solution an experienced data scientist can come up with. Google Cloud AutoML is part of Google’s Machine Learning suite offerings that enables people with limited ML expertise to build high quality models.  Cloud AutoML Vision is built on Google’s transfer learning and neural architecture search technologies. This tool is already being used by a lot of organizations. Amazon Lex provides an easy-to-use console for building your own chatbot in a matter of minutes. Powered by the same deep learning technologies as Alexa It builds a complete Natural Language model You can build conversational interfaces in your applications or website using Lex. All you need to do is supply a few phrases and Amazon Lex does the rest! It has built-in integration with the AWS Azure ML Studio is a simple yet powerful browser based ML platform.
  15. Democratization of AI on how AI is being deployed in some instances above Cloud-based services opens up access to the large data sets and specialized infrastructure needed to support AI and extends the potential of the technology beyond early adopters
  16. The first part of Anatomy shows how an Amazon Echo collects data and feedback from human users.
  17. Shows how the AI system uses interactions with customers to get smarter
  18. internal Amazon service named Zelkova SMT solvers prove and disprove logical formulas