1. Introduction
Scott Cairns
Chief Technology Officer & Head of UK Security Practice
T-Systems Limited
Contributor / Writer
Responsible Robotics Organisation
Independent Writer
Cyber Security, Artificial Intelligence Ethics
@synapfire https://www.synapfire.com cairnsscott
scott.cairns@t-systems.com http://www.t-
systems.co.uk
2. Corporate prioritisation of security & security vendors
IT budget spent on security in 2016
Provision of regular security
education
Have security expert at board level
39%
4%
6%
49%
3. Changing motivations of the attacker
Political influence Geopolitical instability
2004
Nortel
attack
2016
Presidential
elections
2011
AP Twitter
feed attack
Financial gains
Take a holistic look at the landscape in order to understand business imperatives and identify risk
One solution will not work and perimeter based defences are woefully outmatched
On average you are looking at 5 or 6 defensive services to integrate and operate a single defensive system
We are reaching the limits of humanities ability to fight cyber attacks.
Attackers are embracing AI – with polymorphic attack routines and contextual malware
AI will be need to be at the core of future defensive strategy – don’t be shy to embrace it now