SlideShare una empresa de Scribd logo
1 de 120
Descargar para leer sin conexión
2121ststC CyberSecurity DefenceC CyberSecurity Defence
Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025
1
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
2
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” --
5
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
6
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CyberSpaceCyberSpace & Virtual Reality& Virtual Reality:: Hollywood Style!Hollywood Style!
7
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
“Cyber Reality!”“Cyber Reality!” : Global IPv4 Internet Servers:: Global IPv4 Internet Servers: 24/724/7
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): InIn--Depth ZoomDepth Zoom
8
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
“Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other Domain RegistriesOther Domain Registries
9
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970
10
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
11
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
David ProbertDavid Probert
Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
12
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC
13
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
From:From: “Business Blueprint”:“Business Blueprint”: ProbertProbert –– July 1989July 1989
2525thth Anniversary:Anniversary: “KolaNet”“KolaNet” -- Nuclear SecurityNuclear Security
14
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
KolaNetKolaNet Project:Project: 1992 to 19971992 to 1997 –– Kola PeninsulaKola Peninsula –– Russian ArcticRussian Arctic
Protecting Ukraine & Georgian ParliamentsProtecting Ukraine & Georgian Parliaments
-- Integrated Cyber and Physical SecurityIntegrated Cyber and Physical Security --
15
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Internet, Web Sites, & IT Security Programmes initiated 1994Internet, Web Sites, & IT Security Programmes initiated 1994
Ukraine ParliamentUkraine Parliament :: KyivKyiv Georgian Parliament:Georgian Parliament: TbilisiTbilisi
Cybersecurity forCybersecurity for Georgian Parliament:Georgian Parliament: 20072007 -- 20102010
16
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
...Critical Infrastructure Review & RoadMap:...Critical Infrastructure Review & RoadMap: UN/ITU CybersecurityUN/ITU Cybersecurity –– Georgian GovernmentGeorgian Government
Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia
17
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
LinkLink:: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
Cybersecurity &Cybersecurity & eGoveGov Missions:Missions: 20092009--20122012
**Mt AragatsMt Aragats –– South Summit(3879m):South Summit(3879m): ArmeniaArmenia**
18
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 2 –TopTop 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 ––7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
19
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –– Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated”“Integrated”
55 ––Scenario 2020Scenario 2020:: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
77 –– CyberCyber Defence forDefence for CriticalCritical SectorsSectors 88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –YOURYOUR Action Plan for 21stC Cyber!...Action Plan for 21stC Cyber!...
““CyberSecurityCyberSecurity @@ Board Level”Board Level”
•• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and
Governments to Plan & Invest @@ Board LevelBoard Level!
• CyberSecurity Tools are now in TransitionTransition from:
– 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls
–– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence
• Smart IoT Devices, Homes & Cities ALL require
20
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• Smart IoT Devices, Homes & Cities ALL require
Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks!
....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for
C$OC$O led Investment in Effective Cyber Defence!
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
21
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
22
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence:
1) Appoint Board Level CSOBoard Level CSO in Leadership Role!
2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
23
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists
5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap
6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 22 ––””TOPTOP 1010 Cyber Threats & Attacks!”Cyber Threats & Attacks!” 3 – 7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
24
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
25
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
26
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
Thrust SSCThrust SSC –– “Breaking the Sound Barrier”“Breaking the Sound Barrier” **
Mach ONEMach ONE -- 1228km/h1228km/h –– October 1997 *October 1997 *
27
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
28
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
29
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
Red Alert!Red Alert!
30
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
31
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
32
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
33
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
34
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
35
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017
Recommended!Recommended!
36
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf
Recommended!Recommended!
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
37
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
38
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
39
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
40
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack!
41
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
42
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 33 ––77 YearYear CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
43
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
44 ––Scenario 2018:Scenario 2018: CyberCyber & Physical Tools& Physical Tools
“Integrated”“Integrated”
55 ––Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
7 Year7 Year CyberVision:CyberVision: “The New Toolkit”“The New Toolkit”
• During the last 7 Years CyberThreatsCyberThreats targeted:
–– Critical National Infrastructure (CNI):Critical National Infrastructure (CNI): Energy, Banks,
Transport, Government, Healthcare, Education...
–– Major Events:Major Events: Sports, Elections & Culture Festivals...
–– CriminalCriminal eCommerceeCommerce: “The Dark Web” & “SilkRoad”!
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
44
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
Defence against “Zero“Zero--Day”Day” & “Insider”“Insider” Attacks!
• Exponential Increase in Device Connections (IoT)
requires Cyber DefenceCyber Defence through AI/MLAI/ML “Bots”“Bots”
running 24/7 on ALL Networked System Assets!
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
45
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
46
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence”
•• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools
within Organised Crime SyndicatesOrganised Crime Syndicates!
•• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” &
exploited with ease by “BotNets”!“BotNets”!
•• CyberDefenceCyberDefence for Business & Government requires
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
47
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
Defence”Defence” and “Augmented Reality”Augmented Reality”!
...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for:
20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent)
CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence”
•• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools
within Organised Crime SyndicatesOrganised Crime Syndicates!
•• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” &
exploited with ease by “BotNets”!“BotNets”!
•• CyberDefenceCyberDefence for Business & Government requires
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
48
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
Defence”Defence” and “Augmented Reality”Augmented Reality”!
...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for:
20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent)
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
49
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
50
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
51
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202551
44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
52
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
53
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
54
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
55
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202555
4 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
55 ––ScenarioScenario 2020:2020: Internet of Things: IoTInternet of Things: IoT
““Adaptive”Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
Scenario 2020Scenario 2020: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Adaptive Security****** Adaptive Security***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
56
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors
57
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
“IoT Devices”:“IoT Devices”: Wristbands and WatchesWristbands and Watches
58
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
“IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM
59
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures
60
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
61
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
20182018--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
62
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
63
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
64
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture
65
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
EU/IERCEU/IERC –– Research Cluster Reports onResearch Cluster Reports on
““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things
66
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
67
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
ScenarioScenario 2025+2025+:: “Augmented Reality”“Augmented Reality”
*** Intelligent Security ****** Intelligent Security ***
• Major Trends and Developments: Scenario 2025Scenario 2025
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
68
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
69
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
70
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
71
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
72
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
73
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
74
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
75
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
76
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
77
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
78
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
79
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
www.deepinstinct.comwww.deepinstinct.com
** APTAPT = Advanced Persistent Threat *= Advanced Persistent Threat *
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
80
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
81
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
82
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
83
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
84
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
85
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
86
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds””
•• Neural AI/MLNeural AI/ML CyberSecurityCyberSecurity Solutions will require
enhanced Intelligent Human/Machine Interfaces!
• Human Communications run @ Sound Speed....@ Sound Speed.... whilst
Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!..
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
87
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
Software(SW) will “Bridge” Human & Cyber Worlds!
....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces
for Security Management during the next 7 Years!....7 Years!....
Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling
88
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
89
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 202520252121ststC CyberC Cyber Defence:Defence: 20182018 -- 20252025
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
90
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
91
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Algorithmic Computer Trading usingAlgorithmic Computer Trading using RealReal--Time Neural NetsTime Neural Nets
& Statistical Maths Tools have been used for& Statistical Maths Tools have been used for 25+25+ Years!Years!
.....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent
realreal--time forecasts for enterprisetime forecasts for enterprise cybersecuritycybersecurity threats!threats!
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
92
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
93
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
94
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 2040+2040+: Cyber: Cyber DefenseDefense––NATO & CanadaNATO & Canada
95
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ScenarioScenario 2040+2040+: Cyber Defence: Cyber Defence
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
96
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
97
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
44 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
77 –– CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
Critical Sectors:Critical Sectors: Cyber Threat ScenariosCyber Threat Scenarios
•• Hybrid CyberHybrid Cyber--Physical Security ThreatsPhysical Security Threats willwill targettarget ALLALL
ofof YOURYOUR Critical Business and Government Sectors!....Critical Business and Government Sectors!....
a)a) Finance & BankingFinance & Banking – ATMs, Fraud, Money Laundering
b)b) Transport & TourismTransport & Tourism – Airports, Metro, Tourist Sights
c)c) Energy & UtilitiesEnergy & Utilities – Nuclear, Chemical & Water Resources
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
98
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
e)e) Education & ResearchEducation & Research – Campus-Wide Armed Attacks
f)f) Industry & ManufacturingIndustry & Manufacturing – Competitive Espionage
g)g) Retail, Sports & CultureRetail, Sports & Culture – Malls, Concerts, Olympics.....
........CSOsCSOs are advised toare advised to URGENTLYURGENTLY define practicaldefine practical
& effective action plans to mitigate such attacks!...& effective action plans to mitigate such attacks!...
CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things”
Sensor Networks
99
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Critical Sector Case Study:Critical Sector Case Study: Banks & FinanceBanks & Finance
•• Banks & FinancialBanks & Financial Institutions are prime targets for cybercriminals.
•• AccessAccess to Accounts is usually indirect through phishing scams, infected
websites with malicious scripts, and personal ID Theft.
•• OnOn--Line bank transfersLine bank transfers are also commonly used for international money
laundering of funds secured from illegal criminal and political activities
•• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the classic
“Advanced Fee Scam” as well as Lottery and Auction Scams
•• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing
100
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing
•• National & Commercial BanNational & Commercial Banksks have also been regular targets of DDOS
Cyberattacks from politically motivated and terrorist organisations
•• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will receive
penetration scans and Cyberhacks both “direct” & with “Bots” & Trojans
•• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal Banking
are at the “sharp end” of financial security and require significant efforts
towards end-user authentication & transaction network security
...”Intelligent Security”...”Intelligent Security” is now mandatory foris now mandatory for ALLALL Financial Institutions!Financial Institutions!
100
Critical Sector Case Study:Critical Sector Case Study: GovernmentsGovernments
•• Cyber Agencies:Cyber Agencies: Over 70 National Governments (from 193 UN/ITU
Member States) have now Cybersecurity Agencies & Programmes
•• eGovernmenteGovernment ServicesServices are critically dependant upon strong cybersecurity
with authentication for the protection of applications, and citizen data
•• Compliance Audit:Compliance Audit: All Government Ministries & Public Agencies should
receive in-depth ICT security audits and full annual compliance reviews
1) National Defence Forces
2) Parliamentary Resources
3) Land Registry & Planning System
101
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Land Registry & Planning System
4) Citizen IDs and Passports
5) Laws, Legislations, and Policies
6) Civilian Police, Prisons & National e-Crimes Unit (NCU)
7) National CERT – Computer Emergency Response Team
8) Inter-Government Communications Network
9) eServices for Regional & International Partnerships
10) Establishment of cybersecurity standards & compliance
11) Government Security Training and Certification
101
“Smart Security” for Critical Sectors:“Smart Security” for Critical Sectors:
YOURYOUR Shopping and To Do List!Shopping and To Do List!
• Security Audit: In-Depth Security Audit and Action Report - Spanning BOTH
Physical and Cybersecurity Operations, Assets and Technologies
• International Standards: Understand and Implement Security Policies and
Programmes to International Standards – ISO/IEC, UN/ITU, IEEE, NIST, ASIS, ISF
• Training: Professional Training: Form strategic partnerships with leading
educational & research institutions to develop pipeline of professional
graduations in cybersecurity & integrated security technologies
102
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
graduations in cybersecurity & integrated security technologies
• CERT/CSIRTs: Understand the critical role of Cybersecurity CERTs and link their
alerts and operational processes within your overall security policies
• Security Associations: Join Security Associations and follow developments in
Cybersecurity for ““Intelligent RealIntelligent Real--Time Systems”Time Systems” & “Internet of Things”“Internet of Things”
........YOURYOUR Top Priority is ProfessionalTop Priority is Professional Cybersecurity Training & CertificationCybersecurity Training & Certification withwith
regular courseregular course “Top“Top--Ups”Ups” since the field is moving atsince the field is moving at Supersonic SpeedSupersonic Speed!!
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & AttacksCyber Threats & Attacks!! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
103
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CybeCyberr Defence forDefence for CriticalCritical SectorsSectors 88 –– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
“From“From 77 YearYear CyberVisionCyberVision toto RealityReality!”!”
• 7 Year Evolution of Business “$“$ecurityecurity Culture”Culture”
•• Cyber RoadMapCyber RoadMap managed by Board-Level C$O
• Integrated Security with Intelligent AI Alerts!Intelligent AI Alerts!
• Professional Cyber TrainingCyber Training for EVERY Business
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
104
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
•• Trial and DeployTrial and Deploy Adaptive AI Security Solutions
.....CyberSecurityCyberSecurity now requires $$$$$$ Investment in
Teams & Technology to Mitigate Major Risks!...Mitigate Major Risks!...
UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021
DefendDefend –– DeterDeter -- DevelopDevelop
105
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor
Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016
DefendDefend –– DeterDeter -- DevelopDevelop
““YOURYOUR OperationalOperational Cyber DefenceCyber Defence””
•• CC$$O:O: Board Level Role – Chief $ecurity Officer - with
Security Investment Plan and $$$ Budget!..
•• Cyber Standards:Cyber Standards: Migrate to International Security
Standards such as ISO2700x Series
•• Compliance:Compliance: Implement regular IT Asset & Process
Audits to ensure Full Compliance
•• Training:Training: Ensure Key Staff are Professionally Certified
106
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Training:Training: Ensure Key Staff are Professionally Certified
(CISSP) with Bi-Annual Updates.
•• Culture:Culture: Launch Business/Agency Security Policy so ALLALL
Staff understand their Responsibilities!
....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR
BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
107
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
108
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
109
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
110
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Neural Security”“Neural Security”
7 – CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 99 –– YOURYOUR Action Plan for 21Action Plan for 21ststCC Cyber!...Cyber!...
““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan””
• Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a
Campaign Action Plan for Active Cyber Defence!
• Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires:
––C$O:C$O: Board Level Security Plan and $ Investment
111
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
––C$O:C$O: Board Level Security Plan and $ Investment
––Technical:Technical: Professional Team, Tools & Training
––Operational:Operational: Security, Standards & Compliance
........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up
withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!...
• Every CSO needs Board-Level Approval for Annual
Security Business Plan that includes CyberSecurity
• YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include:
–– Investment BudgetInvestment Budget for Integrated Security Solutions
–– Job SpecificationsJob Specifications for Professional “Cyber” Team
112
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Job SpecificationsJob Specifications for Professional “Cyber” Team
–– Security Staff TrainingSecurity Staff Training & Professional Development
–– Technical & OperationalTechnical & Operational Plans & Upgrades
–– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards
.....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
YOUR TOP 10YOUR TOP 10 CyberSecurity Actions!CyberSecurity Actions!
1) CSO – Chief Security Officer’s Team –
Board Level Roles & Responsibilities
2) Professional Training – Suggest Top-
Level CISSP Certification for Team
6) ICT: Hire Qualified Cyber Systems
Technology, Software & Operations Team
7) Review Security Risks & Connectivity of ALL
Enterprise IP Legacy Assets & Devices (IoT)
8) Design Practical Multi-Year Roadmap for
113
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Implement International Security
Standards (ISO/IEC- 27000)
4) Develop Professional CERT Team
5) Profile YOUR Security Staff and
Contractors for Possible Risks
8) Design Practical Multi-Year Roadmap for
Cyber-Physical Security Integration
9) Professional Association Membership for
Team Networking & Skill Building
10) Cyber Legal Protection – Check Your
Contracts for Cyber Trading Risks
“Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders”
AI & Machine LearningAI & Machine Learning
CyberSecurity Tools willCyberSecurity Tools will
114
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CyberSecurity Tools willCyberSecurity Tools will
ProvideProvide “Speed of Light”“Speed of Light”
RealReal--Time Defence againstTime Defence against
TOP 10TOP 10 Threats & Attacks!Threats & Attacks!
“Steam Powered Birds arrive over our Cities! - 1981
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
115
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
ThankThank--You!You!ThankThank--You!You!
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
116
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ThankThank--You!You!ThankThank--You!You!
ThankThank--You!You!ThankThank--You!You!
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
117
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ThankThank--You!You!ThankThank--You!You!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
118
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
LinksLinks:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs && www.slideshare.net/DrDavidProbertwww.slideshare.net/DrDavidProbert
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
119
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
2121ststC CyberSecurity Defence:C CyberSecurity Defence: 20182018––2025!2025!
120
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025

Más contenido relacionado

La actualidad más candente

Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 

La actualidad más candente (20)

Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 

Similar a 21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasJessica Tams
 
DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'Chris Swan
 
Security in the Delivery Pipeline - GOTO Amsterdam 2017
Security in the Delivery Pipeline - GOTO Amsterdam 2017Security in the Delivery Pipeline - GOTO Amsterdam 2017
Security in the Delivery Pipeline - GOTO Amsterdam 2017James Wickett
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersRick Huijbregts
 
Data, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeCisco Canada
 
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...saastr
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Martin Tom-Petersen
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationNine23Ltd
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaData Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaMyNOG
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018Ray Bugg
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldLeonardo
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 
How digitization & BIM is transforming construction
How digitization & BIM is transforming constructionHow digitization & BIM is transforming construction
How digitization & BIM is transforming constructionBIM Design Hub
 
Stuart Higgins - ECO 17: Transforming care through digital health
Stuart Higgins - ECO 17: Transforming care through digital healthStuart Higgins - ECO 17: Transforming care through digital health
Stuart Higgins - ECO 17: Transforming care through digital healthInnovation Agency
 

Similar a 21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025! (20)

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
 
DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'DevSecOps Days London - Teaching 'Shift Left on Security'
DevSecOps Days London - Teaching 'Shift Left on Security'
 
Security in the Delivery Pipeline - GOTO Amsterdam 2017
Security in the Delivery Pipeline - GOTO Amsterdam 2017Security in the Delivery Pipeline - GOTO Amsterdam 2017
Security in the Delivery Pipeline - GOTO Amsterdam 2017
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and Partners
 
Data, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for Change
 
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...
5 Lessons from Scaling 6 Products to $100M+ with Samsara's Chief Strategy Off...
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaData Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
 
The New Era: BIM for High Speed Rail
The New Era: BIM for High Speed RailThe New Era: BIM for High Speed Rail
The New Era: BIM for High Speed Rail
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
How digitization & BIM is transforming construction
How digitization & BIM is transforming constructionHow digitization & BIM is transforming construction
How digitization & BIM is transforming construction
 
Stuart Higgins - ECO 17: Transforming care through digital health
Stuart Higgins - ECO 17: Transforming care through digital healthStuart Higgins - ECO 17: Transforming care through digital health
Stuart Higgins - ECO 17: Transforming care through digital health
 

Más de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Más de Dr David Probert (8)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!

  • 1. 2121ststC CyberSecurity DefenceC CyberSecurity Defence Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025 1 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025 Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational
  • 2. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 2 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 3 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 5. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity -- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” -- 5 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 6. 6 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 CyberSpaceCyberSpace & Virtual Reality& Virtual Reality:: Hollywood Style!Hollywood Style!
  • 7. 7 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 “Cyber Reality!”“Cyber Reality!” : Global IPv4 Internet Servers:: Global IPv4 Internet Servers: 24/724/7
  • 8. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): InIn--Depth ZoomDepth Zoom 8 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 9. “Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other Domain RegistriesOther Domain Registries 9 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 10. BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970 10 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
  • 11. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 11 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 David ProbertDavid Probert
  • 12. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 12 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 13. Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC 13 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 From:From: “Business Blueprint”:“Business Blueprint”: ProbertProbert –– July 1989July 1989
  • 14. 2525thth Anniversary:Anniversary: “KolaNet”“KolaNet” -- Nuclear SecurityNuclear Security 14 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 KolaNetKolaNet Project:Project: 1992 to 19971992 to 1997 –– Kola PeninsulaKola Peninsula –– Russian ArcticRussian Arctic
  • 15. Protecting Ukraine & Georgian ParliamentsProtecting Ukraine & Georgian Parliaments -- Integrated Cyber and Physical SecurityIntegrated Cyber and Physical Security -- 15 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Internet, Web Sites, & IT Security Programmes initiated 1994Internet, Web Sites, & IT Security Programmes initiated 1994 Ukraine ParliamentUkraine Parliament :: KyivKyiv Georgian Parliament:Georgian Parliament: TbilisiTbilisi
  • 16. Cybersecurity forCybersecurity for Georgian Parliament:Georgian Parliament: 20072007 -- 20102010 16 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ...Critical Infrastructure Review & RoadMap:...Critical Infrastructure Review & RoadMap: UN/ITU CybersecurityUN/ITU Cybersecurity –– Georgian GovernmentGeorgian Government
  • 17. Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia 17 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 LinkLink:: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
  • 18. Cybersecurity &Cybersecurity & eGoveGov Missions:Missions: 20092009--20122012 **Mt AragatsMt Aragats –– South Summit(3879m):South Summit(3879m): ArmeniaArmenia** 18 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 19. 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 2 –TopTop 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 ––7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 19 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 4 –– Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated”“Integrated” 55 ––Scenario 2020Scenario 2020:: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 77 –– CyberCyber Defence forDefence for CriticalCritical SectorsSectors 88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –YOURYOUR Action Plan for 21stC Cyber!...Action Plan for 21stC Cyber!...
  • 20. ““CyberSecurityCyberSecurity @@ Board Level”Board Level” •• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and Governments to Plan & Invest @@ Board LevelBoard Level! • CyberSecurity Tools are now in TransitionTransition from: – 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls –– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence • Smart IoT Devices, Homes & Cities ALL require 20 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 • Smart IoT Devices, Homes & Cities ALL require Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks! ....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for C$OC$O led Investment in Effective Cyber Defence!
  • 21. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 21 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
  • 22. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 22 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks ......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
  • 23. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence: 1) Appoint Board Level CSOBoard Level CSO in Leadership Role! 2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 23 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists 5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap 6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!... www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
  • 24. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 22 ––””TOPTOP 1010 Cyber Threats & Attacks!”Cyber Threats & Attacks!” 3 – 7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 24 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 25. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 25 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 26. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** 26 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 27. Thrust SSCThrust SSC –– “Breaking the Sound Barrier”“Breaking the Sound Barrier” ** Mach ONEMach ONE -- 1228km/h1228km/h –– October 1997 *October 1997 * 27 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 28. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 28 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 29. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 29 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 30. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- Red Alert!Red Alert! 30 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! --
  • 31. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 31 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 32. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 32 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 33. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 33 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 34. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 34 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 35. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 35 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 36. Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017 Recommended!Recommended! 36 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf Recommended!Recommended!
  • 37. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 37 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 38. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 38 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 39. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 39 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 40. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 40 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 41. Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack! 41 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 42. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack 42 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 43. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 33 ––77 YearYear CyberVision: The New ToolkitCyberVision: The New Toolkit 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 43 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 44 ––Scenario 2018:Scenario 2018: CyberCyber & Physical Tools& Physical Tools “Integrated”“Integrated” 55 ––Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 44. 7 Year7 Year CyberVision:CyberVision: “The New Toolkit”“The New Toolkit” • During the last 7 Years CyberThreatsCyberThreats targeted: –– Critical National Infrastructure (CNI):Critical National Infrastructure (CNI): Energy, Banks, Transport, Government, Healthcare, Education... –– Major Events:Major Events: Sports, Elections & Culture Festivals... –– CriminalCriminal eCommerceeCommerce: “The Dark Web” & “SilkRoad”! • The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time” 44 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 • The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time” Defence against “Zero“Zero--Day”Day” & “Insider”“Insider” Attacks! • Exponential Increase in Device Connections (IoT) requires Cyber DefenceCyber Defence through AI/MLAI/ML “Bots”“Bots” running 24/7 on ALL Networked System Assets!
  • 45. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 45 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 46. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 46 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 47. CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence” •• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools within Organised Crime SyndicatesOrganised Crime Syndicates! •• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” & exploited with ease by “BotNets”!“BotNets”! •• CyberDefenceCyberDefence for Business & Government requires Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural 47 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural Defence”Defence” and “Augmented Reality”Augmented Reality”! ...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for: 20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent)
  • 48. CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence” •• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools within Organised Crime SyndicatesOrganised Crime Syndicates! •• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” & exploited with ease by “BotNets”!“BotNets”! •• CyberDefenceCyberDefence for Business & Government requires Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural 48 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural Defence”Defence” and “Augmented Reality”Augmented Reality”! ...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for: 20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent) Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
  • 49. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 49 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!” SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 50. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 50 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 51. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 51 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202551 44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 52. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated Security****** Integrated Security*** • Major Trends & Developments: Scenario 2018Scenario 2018: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 52 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
  • 53. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 53 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Shopping List!Shopping List! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
  • 54. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 54 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 55. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 55 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202555 4 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 55 ––ScenarioScenario 2020:2020: Internet of Things: IoTInternet of Things: IoT ““Adaptive”Adaptive” 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 56. Scenario 2020Scenario 2020: “Internet of Things: “Internet of Things -- IoT”IoT” *** Adaptive Security****** Adaptive Security*** • Major Trends and Developments: Scenario 2020Scenario 2020 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 56 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 57. Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors 57 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 58. “IoT Devices”:“IoT Devices”: Wristbands and WatchesWristbands and Watches 58 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 59. “IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM 59 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 60. Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures 60 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 61. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 61 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 62. 20182018--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 62 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 63. 63 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 64. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT” 64 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 65. IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture 65 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 66. EU/IERCEU/IERC –– Research Cluster Reports onResearch Cluster Reports on ““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things 66 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 67. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 67 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 4 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 68. ScenarioScenario 2025+2025+:: “Augmented Reality”“Augmented Reality” *** Intelligent Security ****** Intelligent Security *** • Major Trends and Developments: Scenario 2025Scenario 2025 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 68 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 69. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 69 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 70. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 70 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 71. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 71 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 72. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 72 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 73. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 73 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
  • 74. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 74 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
  • 75. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 75 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
  • 76. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 76 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 77. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 77 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
  • 78. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 78 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
  • 79. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 79 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! www.deepinstinct.comwww.deepinstinct.com ** APTAPT = Advanced Persistent Threat *= Advanced Persistent Threat *
  • 80. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 80 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 81. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 81 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 82. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 82 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 83. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 83 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 84. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 84 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 85. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 85 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 86. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 86 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
  • 87. InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds”” •• Neural AI/MLNeural AI/ML CyberSecurityCyberSecurity Solutions will require enhanced Intelligent Human/Machine Interfaces! • Human Communications run @ Sound Speed....@ Sound Speed.... whilst Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!.. •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & 87 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & Software(SW) will “Bridge” Human & Cyber Worlds! ....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces for Security Management during the next 7 Years!....7 Years!....
  • 88. Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling 88 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
  • 89. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 89 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 202520252121ststC CyberC Cyber Defence:Defence: 20182018 -- 20252025
  • 90. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 90 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 91. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 91 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Algorithmic Computer Trading usingAlgorithmic Computer Trading using RealReal--Time Neural NetsTime Neural Nets & Statistical Maths Tools have been used for& Statistical Maths Tools have been used for 25+25+ Years!Years! .....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent realreal--time forecasts for enterprisetime forecasts for enterprise cybersecuritycybersecurity threats!threats!
  • 92. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 92 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 93. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 93 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 94. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 94 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 95. ScenarioScenario 2040+2040+: Cyber: Cyber DefenseDefense––NATO & CanadaNATO & Canada 95 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 96. ScenarioScenario 2040+2040+: Cyber Defence: Cyber Defence UK Ministry of DefenceUK Ministry of Defence -- MODMOD 96 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 97. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 97 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 44 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 77 –– CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 98. Critical Sectors:Critical Sectors: Cyber Threat ScenariosCyber Threat Scenarios •• Hybrid CyberHybrid Cyber--Physical Security ThreatsPhysical Security Threats willwill targettarget ALLALL ofof YOURYOUR Critical Business and Government Sectors!....Critical Business and Government Sectors!.... a)a) Finance & BankingFinance & Banking – ATMs, Fraud, Money Laundering b)b) Transport & TourismTransport & Tourism – Airports, Metro, Tourist Sights c)c) Energy & UtilitiesEnergy & Utilities – Nuclear, Chemical & Water Resources d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military 98 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military e)e) Education & ResearchEducation & Research – Campus-Wide Armed Attacks f)f) Industry & ManufacturingIndustry & Manufacturing – Competitive Espionage g)g) Retail, Sports & CultureRetail, Sports & Culture – Malls, Concerts, Olympics..... ........CSOsCSOs are advised toare advised to URGENTLYURGENTLY define practicaldefine practical & effective action plans to mitigate such attacks!...& effective action plans to mitigate such attacks!...
  • 99. CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things” Sensor Networks 99 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
  • 100. Critical Sector Case Study:Critical Sector Case Study: Banks & FinanceBanks & Finance •• Banks & FinancialBanks & Financial Institutions are prime targets for cybercriminals. •• AccessAccess to Accounts is usually indirect through phishing scams, infected websites with malicious scripts, and personal ID Theft. •• OnOn--Line bank transfersLine bank transfers are also commonly used for international money laundering of funds secured from illegal criminal and political activities •• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the classic “Advanced Fee Scam” as well as Lottery and Auction Scams •• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing 100 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing •• National & Commercial BanNational & Commercial Banksks have also been regular targets of DDOS Cyberattacks from politically motivated and terrorist organisations •• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will receive penetration scans and Cyberhacks both “direct” & with “Bots” & Trojans •• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal Banking are at the “sharp end” of financial security and require significant efforts towards end-user authentication & transaction network security ...”Intelligent Security”...”Intelligent Security” is now mandatory foris now mandatory for ALLALL Financial Institutions!Financial Institutions! 100
  • 101. Critical Sector Case Study:Critical Sector Case Study: GovernmentsGovernments •• Cyber Agencies:Cyber Agencies: Over 70 National Governments (from 193 UN/ITU Member States) have now Cybersecurity Agencies & Programmes •• eGovernmenteGovernment ServicesServices are critically dependant upon strong cybersecurity with authentication for the protection of applications, and citizen data •• Compliance Audit:Compliance Audit: All Government Ministries & Public Agencies should receive in-depth ICT security audits and full annual compliance reviews 1) National Defence Forces 2) Parliamentary Resources 3) Land Registry & Planning System 101 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 3) Land Registry & Planning System 4) Citizen IDs and Passports 5) Laws, Legislations, and Policies 6) Civilian Police, Prisons & National e-Crimes Unit (NCU) 7) National CERT – Computer Emergency Response Team 8) Inter-Government Communications Network 9) eServices for Regional & International Partnerships 10) Establishment of cybersecurity standards & compliance 11) Government Security Training and Certification 101
  • 102. “Smart Security” for Critical Sectors:“Smart Security” for Critical Sectors: YOURYOUR Shopping and To Do List!Shopping and To Do List! • Security Audit: In-Depth Security Audit and Action Report - Spanning BOTH Physical and Cybersecurity Operations, Assets and Technologies • International Standards: Understand and Implement Security Policies and Programmes to International Standards – ISO/IEC, UN/ITU, IEEE, NIST, ASIS, ISF • Training: Professional Training: Form strategic partnerships with leading educational & research institutions to develop pipeline of professional graduations in cybersecurity & integrated security technologies 102 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 graduations in cybersecurity & integrated security technologies • CERT/CSIRTs: Understand the critical role of Cybersecurity CERTs and link their alerts and operational processes within your overall security policies • Security Associations: Join Security Associations and follow developments in Cybersecurity for ““Intelligent RealIntelligent Real--Time Systems”Time Systems” & “Internet of Things”“Internet of Things” ........YOURYOUR Top Priority is ProfessionalTop Priority is Professional Cybersecurity Training & CertificationCybersecurity Training & Certification withwith regular courseregular course “Top“Top--Ups”Ups” since the field is moving atsince the field is moving at Supersonic SpeedSupersonic Speed!!
  • 103. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & AttacksCyber Threats & Attacks!! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 103 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – CybeCyberr Defence forDefence for CriticalCritical SectorsSectors 88 –– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
  • 104. “From“From 77 YearYear CyberVisionCyberVision toto RealityReality!”!” • 7 Year Evolution of Business “$“$ecurityecurity Culture”Culture” •• Cyber RoadMapCyber RoadMap managed by Board-Level C$O • Integrated Security with Intelligent AI Alerts!Intelligent AI Alerts! • Professional Cyber TrainingCyber Training for EVERY Business •• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff” 104 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff” •• Trial and DeployTrial and Deploy Adaptive AI Security Solutions .....CyberSecurityCyberSecurity now requires $$$$$$ Investment in Teams & Technology to Mitigate Major Risks!...Mitigate Major Risks!...
  • 105. UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021 DefendDefend –– DeterDeter -- DevelopDevelop 105 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016 DefendDefend –– DeterDeter -- DevelopDevelop
  • 106. ““YOURYOUR OperationalOperational Cyber DefenceCyber Defence”” •• CC$$O:O: Board Level Role – Chief $ecurity Officer - with Security Investment Plan and $$$ Budget!.. •• Cyber Standards:Cyber Standards: Migrate to International Security Standards such as ISO2700x Series •• Compliance:Compliance: Implement regular IT Asset & Process Audits to ensure Full Compliance •• Training:Training: Ensure Key Staff are Professionally Certified 106 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 •• Training:Training: Ensure Key Staff are Professionally Certified (CISSP) with Bi-Annual Updates. •• Culture:Culture: Launch Business/Agency Security Policy so ALLALL Staff understand their Responsibilities! ....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
  • 107. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017 NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology 107 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
  • 108. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017 NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology 108 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
  • 109. NISTNIST CybersecurityCybersecurity FrameworkFramework National Institute of Standards & TechnologyNational Institute of Standards & Technology 109 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
  • 110. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit 4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 110 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated”“Integrated” 5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning “Neural Security”“Neural Security” 7 – CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 99 –– YOURYOUR Action Plan for 21Action Plan for 21ststCC Cyber!...Cyber!...
  • 111. ““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan”” • Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a Campaign Action Plan for Active Cyber Defence! • Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires: ––C$O:C$O: Board Level Security Plan and $ Investment 111 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ––C$O:C$O: Board Level Security Plan and $ Investment ––Technical:Technical: Professional Team, Tools & Training ––Operational:Operational: Security, Standards & Compliance ........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
  • 112. YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!... • Every CSO needs Board-Level Approval for Annual Security Business Plan that includes CyberSecurity • YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include: –– Investment BudgetInvestment Budget for Integrated Security Solutions –– Job SpecificationsJob Specifications for Professional “Cyber” Team 112 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Job SpecificationsJob Specifications for Professional “Cyber” Team –– Security Staff TrainingSecurity Staff Training & Professional Development –– Technical & OperationalTechnical & Operational Plans & Upgrades –– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards .....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
  • 113. YOUR TOP 10YOUR TOP 10 CyberSecurity Actions!CyberSecurity Actions! 1) CSO – Chief Security Officer’s Team – Board Level Roles & Responsibilities 2) Professional Training – Suggest Top- Level CISSP Certification for Team 6) ICT: Hire Qualified Cyber Systems Technology, Software & Operations Team 7) Review Security Risks & Connectivity of ALL Enterprise IP Legacy Assets & Devices (IoT) 8) Design Practical Multi-Year Roadmap for 113 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 3) Implement International Security Standards (ISO/IEC- 27000) 4) Develop Professional CERT Team 5) Profile YOUR Security Staff and Contractors for Possible Risks 8) Design Practical Multi-Year Roadmap for Cyber-Physical Security Integration 9) Professional Association Membership for Team Networking & Skill Building 10) Cyber Legal Protection – Check Your Contracts for Cyber Trading Risks
  • 114. “Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders” AI & Machine LearningAI & Machine Learning CyberSecurity Tools willCyberSecurity Tools will 114 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 CyberSecurity Tools willCyberSecurity Tools will ProvideProvide “Speed of Light”“Speed of Light” RealReal--Time Defence againstTime Defence against TOP 10TOP 10 Threats & Attacks!Threats & Attacks! “Steam Powered Birds arrive over our Cities! - 1981 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
  • 115. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 115 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 116. ThankThank--You!You!ThankThank--You!You! 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 116 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ThankThank--You!You!ThankThank--You!You!
  • 117. ThankThank--You!You!ThankThank--You!You! 2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025 117 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 ThankThank--You!You!ThankThank--You!You!
  • 118. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 118 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 LinksLinks:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs && www.slideshare.net/DrDavidProbertwww.slideshare.net/DrDavidProbert
  • 119. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 119 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025 Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 120. 2121ststC CyberSecurity Defence:C CyberSecurity Defence: 20182018––2025!2025! 120 -- 2121ststC CyberSecurity DefenceC CyberSecurity Defence -- “The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025” *** London, UK – September 2017 *** © Dr David E. Probert : www.VAZA.com © 2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025