SlideShare una empresa de Scribd logo
1 de 106
Descargar para leer sin conexión
*21*21ststC Cybersecurity Trends*C Cybersecurity Trends*
“CyberVision: 2015“CyberVision: 2015--2025”2025”
1CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
“CyberVision: 2015“CyberVision: 2015--2025”2025”
-- Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security ––
Dr David E. ProbertDr David E. ProbertDr David E. ProbertDr David E. Probert
“CyberVision:“CyberVision: 20152015 –– 2025”2025”
•• My Vision:My Vision: My Personal “CyberVision”“CyberVision” develops practical
scenarios for the next 10 Year Evolution of Cybersecurity
•• World Transition:World Transition: From 2020ththC PhysicalC Physical to 2121ststC Cyber WorldC Cyber World
•• AI Evolution:AI Evolution: Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security
•• Marketplace:Marketplace: The Global CybersecuritCybersecurity Business Sector is
forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025
2CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025
•• CybersecurityCybersecurity is at the Core of 21stC Society: ProActive
Real-Time Defence against Worldwide 24/7 Threats from
*** CyberTerrorism, Cyber Crime & Cyber Warfare ***CyberTerrorism, Cyber Crime & Cyber Warfare ***
... We need to fully embed Intelligent & AdaptiveWe need to fully embed Intelligent & Adaptive
Cybersecurity within theCybersecurity within the “Internet of Things”“Internet of Things”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World!! ......
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World!! ......
GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- “Worldwide Internet Census 2012”“Worldwide Internet Census 2012” --
5CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
11 –– Background:Background: “21st Security Landscape”“21st Security Landscape” 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
6CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity
•• 2020ththC : 1995C : 1995 -- 2010 :2010 : Focus on Firewalls &
Antivirus – based upon Physical “Spatial”
Security Models (Castles & Moats)
.........Protection @Protection @ “Speed of Sound”“Speed of Sound” ((SpaceSpace))
7CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
.........Protection @Protection @ “Speed of Sound”“Speed of Sound” ((SpaceSpace))
•• 2121ststC : 2010C : 2010 –– 2025 :2025 : Focus on Adaptive, and
Self-Organising “Cyber” Tools – based upon
Temporal Models (AI & Machine Learning)
.........Defending @Defending @ “Speed of Light”“Speed of Light” ((TimeTime))
2121ststCC CyberSecurityCyberSecurity LandscapeLandscape
•• Convergence of Physical & Cybersecurity OperationsConvergence of Physical & Cybersecurity Operations
•• “Cyber” migrates from IT Dept to Main Board: C“Cyber” migrates from IT Dept to Main Board: C--SuiteSuite
•• Global RealGlobal Real--Time Targeted Cyber AttacksTime Targeted Cyber Attacks –– 24/724/7
•• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to
8CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to
“Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning)
•• Emergence of Enterprise “Internet of Things”Emergence of Enterprise “Internet of Things”
•• Evolution of Smart Devices, Cities, Economy & SocietyEvolution of Smart Devices, Cities, Economy & Society
•• Dramatic increase in Cyber Crime & Cyber TerrorismDramatic increase in Cyber Crime & Cyber Terrorism
CybersecurityCybersecurity Market SectorsMarket Sectors
•• AntiAnti--Virus/FirewallVirus/Firewall
•• ID AuthenticationID Authentication
•• Encryption/PrivacyEncryption/Privacy
•• Risk & ComplianceRisk & Compliance
•• Mobile Device SecurityMobile Device Security
•• AI & Machine LearningAI & Machine Learning
•• Enterprise IoT SecurityEnterprise IoT Security
•• Cloud Security ServicesCloud Security Services
•• Big Data ProtectionBig Data Protection
•• RT Log/Event AnalyticsRT Log/Event Analytics
9CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Mobile Device SecurityMobile Device Security
•• AntiAnti--Fraud MonitoringFraud Monitoring
•• Website ProtectionWebsite Protection
•• S/W Code VerificationS/W Code Verification
•• RT Log/Event AnalyticsRT Log/Event Analytics
•• RealReal--Time Threat MapsTime Threat Maps
•• Smart BiometricsSmart Biometrics
•• Training & CertificationTraining & Certification
Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services...
....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
1 – Background: 21stC Security Landscape 22 –– CybersecurityCybersecurity –– Players & ThreatsPlayers & Threats 3 – Cyber Market Structure, Size & Growth
4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
10CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
Friday 23Friday 23rdrd Oct 2015Oct 2015
11CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
MajorMajor CyberCyber--AttackAttack UK Internet Service ProviderUK Internet Service Provider
EstimatedEstimated $$$$$$ Loss =Loss = $55$55 MillionMillion
1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting
Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne
12CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
£1.9bn Cybercrime Budget£1.9bn Cybercrime Budget
UK National Cyber CentreUK National Cyber Centre
National Cyber Crime UnitNational Cyber Crime Unit
Typical GlobalTypical Global“Botnet”“Botnet” Cyber AttackCyber Attack
13CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Wired Magazine – Summer 2007
Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers
-- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” --
14CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity Index (Dec 2014)Index (Dec 2014)
15CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Map ofMap of RecentRecent Malicious Activity inMalicious Activity in “Cyberspace”“Cyberspace”
16CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
www.team-cymru.org : - Malicious Activity over 30 daysMalicious Activity over 30 days -- Sept 2014Sept 2014
Worldwide : 2012Worldwide : 2012
-- IPv4 Census MapIPv4 Census Map --
17CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012
18CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1)
19CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2)
20CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3)
21CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4)
22CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
20152015--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
23CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
Contrast between our Physical & Cyber WorldsContrast between our Physical & Cyber Worlds
Convergence to 21Convergence to 21ststC “Intelligent Worlds” will take time!C “Intelligent Worlds” will take time!
Physical World = “Space”Physical World = “Space”
• Top-Down
• Dynamic
• Secrecy
• Territorial – “Geographical Space”
• Government Power
• Control
• Direct
Cyber World = “Time”Cyber World = “Time”
• Bottom-Up
• Self-Organising
• Transparency
• Global – “Real-Time”
• Citizen Power
• Freedom
• Proxy
24CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
• Direct
• Padlocks & Keys
• Convergent
• Hierarchical
• Carbon Life
• Tanks & Missiles
• Mass Media
• Proxy
• Passwords & Pins
• Divergent
• Organic
• Silicon Life
• Cyber Weapons & “Botnets”
• Social Media
“Smart Security”“Smart Security” will require Embedded Networked Intelligence in ALL future IoT deviceswill require Embedded Networked Intelligence in ALL future IoT devices
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19951995--20152015
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
25CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security RisksHigh Security Risks:: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19951995--20152015
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
26CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security RisksHigh Security Risks:: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
MainMain CyberCyber Players and their MotivesPlayers and their Motives
•• Cyber Criminals:Cyber Criminals: Seeking commercial gain from
hacking banks & financial institutions as well a phishing
scams & computer ransom ware
•• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical
assets, and national infrastructure for aims relating to
political power & “branding”
•• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to
27CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to
penetrate both corporate & military data servers in
order to obtain plans & intelligence
•• CyberCyber HackivistsHackivists:: Groups such as “Anonymous” with
Political Agendas that hack sites & servers to virally
communicate the “message” for specific campaigns
CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios
•• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to
allow theft or corruption of Cyber Information / IT DataBases
and Confidential Plans
•• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls &
IT Databases to allow Criminals/Terrorists to enter Target
Facilities (such as Military Bases, Banking HQ, Telco/Mobile
Network Operations)
28CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Network Operations)
•• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the
weakest links which in the 21stC will be BOTH Cyber Network
Operations and Physical Security Ops
.......Cyber AttacksCyber Attacks are now fully industrialised with Malicious
Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKNETDARKNET
AnonymousAnonymous--Hacktivists declareHacktivists declare “Total War”“Total War”
onon ISISISIS afterafter Paris AttacksParis Attacks –– 1616thth Nov 2015Nov 2015
29CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
30CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 33 –– CyberCyber Market Structure, Size & GrowthMarket Structure, Size & Growth
4 - CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
31CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 - CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
CybersecurityCybersecurity Market Size & GrowthMarket Size & Growth
•• 2015:2015: Worldwide EstimatedWorldwide Estimated - $97$97 Billion
•• 2020:2020: Worldwide ProjectedWorldwide Projected - $170$170 Billion
–– North America:North America: - $64Bn – 10.0% CAGR (38%)
–– Europe:Europe: - $39Bn – 7.2% CAGR (23%)
–– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%)
32CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
–– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%)
–– Middle East & Africa:Middle East & Africa: - $15Bn – 13.7% CAGR (9%)
–– Latin America:Latin America: - $14Bn –17.6% CAGR (8%)
(SourcesSources: “Micro Market Monitor” & “Markets and Markets” –
Estimated and Extrapolated from projections for 20142014 –– 20192019)
•• 2025:2025: WorldwideWorldwide @ 10% CAGR - $275$275 Billion
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
44 –– CSO: CCSO: C--Suite Security IntegrationSuite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
33CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
44 –– CSO: CCSO: C--Suite Security IntegrationSuite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
CSO:CSO: Board Level Security IntegrationBoard Level Security Integration
•• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security
managed with minimal common operations
•• 2121ststC CSO Model:C CSO Model: Business & Government
urgently need to manage TOTAL Cyber-
34CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
urgently need to manage TOTAL Cyber-
Physical Operations at C-Suite Board Level
•• Investment Plan:Investment Plan: CSOs need professional
team & Investment Budget to manage physical
& cyber security risks, threats and attacks!
CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations
•• CybersecurityCybersecurity for Government, Business & Critical Sectors can now be
integrated with operational physical security solutions including:
1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities
2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Traffic & Parking
3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with CCTV & Alarm Control Centres
4)4) Personnel RFIDPersonnel RFID and BiometricsBiometrics for Office, Warehouse & Campus Access Controls
5) Professionally trained Security Personnel & GuardsSecurity Personnel & Guards – 24/7 – for top security facilities
6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors
35CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors
7)7) Intelligent PerimeterIntelligent Perimeter security controls for campuses and critical service facilities such
as airports, power stations, refineries, hospitals and government institutions
8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities
9) Focus upon in-depth Access ControlAccess Control for computer server rooms & data storage
“Integrated Real“Integrated Real--TimeTime CyberCyber--PhysicalPhysical Security Operations”Security Operations”
“SMART SECURITY”“SMART SECURITY”
Integration of Physical and CybersecurityIntegration of Physical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
36CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
37CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
55 –– ScenarioScenario 2020: Internet of Things (IoT)2020: Internet of Things (IoT)
”Adaptive””Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
Our CyberVision:Our CyberVision: 20202020 -- 20252025
•• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoTIoT:: Managed
Integration of IoT, Cyber & Physical Ops under CSO
38CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• ScenarioScenario 20252025 –– Intelligent SecurityIntelligent Security:: Transition to
Real-Time Artificial Intelligence & Machine Learning
based Enterprise Cybersecurity Tools & Solutions
ScenarioScenario 2020:2020: Adaptive SecurityAdaptive Security -- IoTIoT
• ....5 Year Time Window - 2010 <2010 <–– 20152015 --> 2020> 2020
• Integrated CyberCyber--Physical SecurityPhysical Security deployed &
managed by Board Level Chief Security Officer
•• International StandardsInternational Standards for “IoT” APIs, Net
Interface, Security Standards & Operations
39CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• International StandardsInternational Standards for “IoT” APIs, Net
Interface, Security Standards & Operations
•• Distributed SecurityDistributed Security for “Legacy”“Legacy” Network
Assets & Devices for the “Internet of Things”
• Trial Deployment of Advanced AIAdvanced AI--basedbased
Intelligent & Adaptive Cybersecurity Tools
EnterpriseEnterprise “Internet of Things”“Internet of Things”-- IoTIoT
•• CyberCyber--Enterprise:Enterprise: During the next 5-10 years of
Cyber Evolution the Internet will extend to
practically ALL our IT enabled devices within cars,
homes, offices, power stations & retail products!
This is defined as the “Internet of Things” – IoT.
40CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
This is defined as the “Internet of Things” – IoT.
•• Extended Security:Extended Security: ALL IoT connected devices,
nodes & servers must be secured against attack!
•• CSO Challenge:CSO Challenge: The IoT is the next Cyber Conflict
Zone and Security Challenge for Enterprise CSOs!
Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution
41CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors
42CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
CyberCyber--PhysicalPhysical Threats from the “IoT”Threats from the “IoT”
•• ALL Networked DevicesALL Networked Devices are at risk from
Cyber-Hacking, Penetration & Remote Control
•• IoT Devices:IoT Devices: Smart Phones, Home Controls,
Vehicles, Industrial Controls, Smart Cities,
43CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Vehicles, Industrial Controls, Smart Cities,
Power Stations, Utilities, Medical Devices.....
•• Legacy Assets:Legacy Assets: Many legacy assets including
cars, medical implants, industrial controls are
still inherently INSECUREINSECURE against cyberattacks!
PracticalPractical Security SolutionsSecurity Solutions for thefor the “IoT”“IoT”
•• European UnionEuropean Union -- IERC:IERC: Extensive “IoT” research
during the last 5 years including security.
•• IEEE IoT Community, Journal & Conference :IEEE IoT Community, Journal & Conference :
Recent international focus upon IoT Security
44CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Recent international focus upon IoT Security
Standards and Engineering Practical Solutions.
•• Advanced Cyber Tools:Advanced Cyber Tools: Sustainable IoT Network
Security requires innovative 21stC Adaptive &
Self-learning tools based upon research into
Artificial Intelligence and Machine Learning.
Internet of Things:Internet of Things: Business AlliancesBusiness Alliances
45CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
-- Security for theSecurity for the Internet of ThingsInternet of Things --
Security & Privacy inSecurity & Privacy in HyperconnectedHyperconnected SocietySociety
46CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT”
47CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020
48CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyber 2020 Visions:Cyber 2020 Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton
and The Australian Government (Defence)and The Australian Government (Defence)
49CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
1 – Background: 21stC Security Landscape 2 – – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 66 –– Scenario 2025: AI & Machine LearningScenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
50CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
66 –– Scenario 2025: AI & Machine LearningScenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
ScenarioScenario 20252025:: Intelligent SecurityIntelligent Security
• ..10 Year Time Window - 2005 <2005 <–– 20152015 --> 2025> 2025
• Transition & Full Deployment of Enterprise-
Wide AI-based IntelligentIntelligent “Cyber” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL
aspects of Net Traffic, System/Event Logs, Net
51CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
• Real-Time Behavioural ModellingBehavioural Modelling of ALL
aspects of Net Traffic, System/Event Logs, Net
Nodes, Servers, Databases, Devices & Users
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both traditional
& advanced AI-based “Cybersecurity Tools”
CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios
*** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon ***
52CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
53CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Microsoft 2025:Microsoft 2025: Cyberspace ScenariosCyberspace Scenarios
Technology Visions:Technology Visions: ScenarioScenario 20252025
54CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new
55CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new
malware that can no defined “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
....“Machine Learning Methods”....“Machine Learning Methods” forfor
Cybersecurity developed fromCybersecurity developed from 2010...2010...
56CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Since 2010, leading Cybersecurity Specialists have explored
AI & Machine Learning to mitigate cyber threats & attacks!
Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
57CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge University :Cambridge University : 19731973 -- 19761976
58CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
59CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences
•• Organic DNAOrganic DNA--based Life has adaptation, learningbased Life has adaptation, learning
& intelligence based upon self& intelligence based upon self--organisation:organisation:
–– Bee HivesBee Hives with regular Honeycombs
–– Ant ColoniesAnt Colonies & Termite Hills
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
60CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
–– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids
–– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security
–– Mammalian BrainsMammalian Brains evolved from Neural Networks
....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon
the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems”
61CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
-- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! --
The Sociable Weaver Bird
“World’s largest Bird Nests”
*** Southern Africa ***
62CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•Secure Living Community
•Self-Organising Architecture
•Fully scalable for long term growth
•Supports 250+ Weaver Birds
•Real-Time Disaster Alert System
•Sustainable in Semi-Desert Steppe
•Robust against “Enemy Risks”
such as Eagles, Vultures & Snakes
...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
“Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator:
-- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) --
63CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator
....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities”
Dynamic Duffing Equation: - Exhibits Chaotic Behaviour
64CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
2D Super2D Super--Cyclic Cellular Automaton:Cyclic Cellular Automaton:
-- Emergence of Patterns from Random ChaosEmergence of Patterns from Random Chaos --
65CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cellular Automata:Cellular Automata: “Games of Life”“Games of Life”
66CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
“Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set
67CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
““Machine LearningMachine Learning Algorithms”Algorithms”
68CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb
Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl”
69CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
1984: “Birth” of Intelligent Networks1984: “Birth” of Intelligent Networks
andand “Death” of Personal Privacy“Death” of Personal Privacy ??
70CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
-- City Business SystemsCity Business Systems –– British TelecomBritish Telecom ––
Launch of RealLaunch of Real--Time Financial Trading:Time Financial Trading: 19841984
71CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
72CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Algorithmic Computer Trading using Real-Time Neural Nets
& Statistical Maths Tools have been used for 20+ Years!
.....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent
realreal--time forecasts for Enterprise Cybersecurity Threats!time forecasts for Enterprise Cybersecurity Threats!
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
73CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Towards 2025 :Towards 2025 : ““Smart Security Solutions”Smart Security Solutions”
• The Application of Artificial Intelligence and Machine Learning
allows us to develop “Smart Security Solutions”“Smart Security Solutions” as follows:
……..……..”Smart Security Solutions””Smart Security Solutions” typically possess the following features:typically possess the following features:
1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks
2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
74CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to
scale in space & time from micro cells to macro solutions
6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from
Global Social Networks, Search & On-Line Trade & Commerce
7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations
………Now we’ll consider how “………Now we’ll consider how “AI & Machine Learning”AI & Machine Learning” principles are
being engineered intobeing engineered into 2121ststC Cybersecurity Solutions & Services...C Cybersecurity Solutions & Services...
Building our 2025Building our 2025 Smart SecuritySmart Security ToolkitToolkit
(1) Smart(1) Smart DecisionDecision PrinciplesPrinciples -- “D“D--Genes”Genes”
•• Business DecisionsBusiness Decisions require focusing & filtering of Big Data
sources in Space-Time to create local knowledge (Data Mining).
Hence a useful metaphor is the “Knowledge Lens”:“Knowledge Lens”:
– Smart Decision “Genes”“Genes” = Space, Time and Information Focus
– Conceptual ““Knowledge Lens”Knowledge Lens” can filter and focus information in
“Space” from searching Big Data Sets to a Small focused Short-List
75CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
“Space” from searching Big Data Sets to a Small focused Short-List
– The “Knowledge Lens”“Knowledge Lens” can focus information & present in real-time,
possibly as an stream of multi-media news or market intelligence
•• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle
in the design of Smart SecuritySmart Security, Smart Business & Smart Governance
....21stC....21stC Cyber AttacksCyber Attacks occur in Realoccur in Real--TimeTime @Optical Speeds@Optical Speeds
so ultra fast analysis, decisions and action is a must!so ultra fast analysis, decisions and action is a must!
Building our 2025Building our 2025 Smart SecuritySmart Security ToolkitToolkit
(2) Smart(2) Smart LearningLearning PrinciplesPrinciples -- “L“L--Genes”Genes”
•• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and
Scalable Architecture. The Decision “Genes” are relatively traditional whilst
these new Learning “Genes” lie at the heart of Smart Security.
–– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living
systems and communities which include the well known self-
organisation of insect roles in communities such as ants & bees.
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from
76CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from
simple mathematical rules, as in Conway’s “Game of Life”“Game of Life”
–– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in
complex chaotic behaviour as found in real world insect populations
–– Scalable ArchitectureScalable Architecture is also an essential feature of plants & animal
life & Mandelbrot’s theory of Fractal Curves provides vivid examples.
.....Current Trends:.....Current Trends: Research into AI, Machine Learning, Self-Organisation &
Adaptation remains highly active in both Universities & Commercial R&D Labs
Hybrid 21Hybrid 21ststC Business OrganisationC Business Organisation
-- Hierarchical & OrganicHierarchical & Organic --
•• TransitionTransition from 20thC to 21stC Business, Governance & Security
requires fundamental re-structuring of operations:
–– 2020ththC Industrial Organisations:C Industrial Organisations: Hierarchical Bureaucracies
(Pyramids) to manually process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer
77CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
2121 C Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer
Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds”
•• Living SystemsLiving Systems, such as Mammals, use Hybrid Organisation of
their extended nervous system (Brain & BodyBrain & Body) to optimise real-
time learning and effective environmental adaptation!
•• Smart Security SolutionsSmart Security Solutions will also require HybridHybrid organisation
to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
20252025 : Designing “: Designing “Smart Security”Smart Security”
•• Smart Security SolutionsSmart Security Solutions all use combinations of these Basic ICT
Learning & Decision “genes” shared with Intelligent Living Systems:
1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked)
2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time & Decision Focus
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
78CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
4)4) Smart Security Solutions and Services:Smart Security Solutions and Services: Integration of Decision
and Learning “Genes”, within Secure & Resilient Systems Environment
.....Using “.....Using “AI & Machine Learning”AI & Machine Learning”,, 2121ststC Cyber Ventures are nowC Cyber Ventures are now
marketing “Smart”marketing “Smart” SelfSelf--Learning CybersecurityLearning Cybersecurity Tools to secureTools to secure
Enterprises, Government & Critical Information InfrastructureEnterprises, Government & Critical Information Infrastructure!!
BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040
79CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense::
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
80CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
81CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
82CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
Scenario 2040: CyberScenario 2040: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
83CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
84CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
77 –– CybersecurityCybersecurity Ventures (Old and New)Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 –YOUR Actions Plan for 21stC Cyber!....
Cybersecurity CompaniesCybersecurity Companies -- USAUSA
•• FireEyeFireEye –– Next Generation Security
•• NorseNorse –– In-Depth Real-Time Intel
•• CylanceCylance –– AI/ML Threat DetectionAI/ML Threat Detection
•• DB NetworksDB Networks –– Real-Time ML Defence
LanCopeLanCope –– Security Threat IntelligenceSecurity Threat Intelligence
•• AlienVaultAlienVault –– Intelligent Security
•• RSARSA –– Big Data & Cloud Security
• Palantir –Analytics & Fraud
• Daon – Biometics & ID Mgt
• Akamai –Cloud & Mobile
• Qualys – Cloud Security
• Blue Coat – Business AssuranceBusiness Assurance
• Arbor Networks – DDoS Attack
• Zscaler – Security Services
85CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• RSARSA –– Big Data & Cloud Security
•• VeraCodeVeraCode –– Secure Code Analytics
•• Palo Alto NetworksPalo Alto Networks –– Next Gen Cyber
•• Resilient SystemsResilient Systems –– Auto Threat Alert
•• PrelertPrelert –– Machine Learning Solutions
• Barracuda Networks – Firewalls+
• Zscaler – Security Services
• Sonatype – Enterprise Security
• Okta –Identity Management
• Skybox Security –Risk Analytics
• LogRhythm – Log Mgt Analytics
• PKWare – Data Encryption
USA/CanadaUSA/Canada is estimated to beis estimated to be 38% ($37Bn)38% ($37Bn) of Globalof Global CyberSecurityCyberSecurity MarketplaceMarketplace
Norse Corporation:Norse Corporation: Intelligence ServiceIntelligence Service
86CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation
New Cybersecurity CompaniesNew Cybersecurity Companies -- UKUK
•• DarkTraceDarkTrace – Machine Learning
•• AvectoAvecto – Endpoint Security
•• AcunetixAcunetix –Vulnerability Scanner
•• PortSwiggerPortSwigger – Web Security
•• WanderaWandera –Secure Mobile Portal
•• ClearswiftClearswift – Big Data Security
•• SiloBreakerSiloBreaker – Risk Analytics
•• SentryBaySentryBay -Mobile & IoT
•• Swivel SecureSwivel Secure -Authentication
•• Digital ShadowsDigital Shadows - Cyber Intel
87CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• WanderaWandera –Secure Mobile Portal
•• SentryBaySentryBay –Mobile, IoT Security
•• CiticusCiticus – Risk & Compliance Mgt
•• ProtectimusProtectimus - 2-Factor Security
•• Digital ShadowsDigital Shadows - Cyber Intel
•• Smooth WallSmooth Wall - Threat Mgt
•• BeCryptBeCrypt-Mobile Data Security
•• AcuityAcuity – Compliance & Risk Mgt
Cybersecurity CompaniesCybersecurity Companies -- IsraelIsrael
•• CyberArkCyberArk –(NASDAQ – CYBR)
•• CheckPointCheckPoint –(NASDAQ–CHKP)
•• ElbitElbit SystemsSystems -- (NASDAQ –ESLT)
•• CheckMarxCheckMarx – Code Analytics
SeculertSeculert – Attack Detection
•• RadwareRadware -- (NASDAQ – RDWR)
•• Light CyberLight Cyber – Threat Detection
•• GreenSQLGreenSQL – Secure Database
•• GuardiCoreGuardiCore – Server Security
CyActiveCyActive – Acquired by Paypal
88CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• SeculertSeculert – Attack Detection
•• SentrixSentrix – Cloud DMZ Firewall
•• TrapXTrapX –– “HoneyPot” Solutions
•• SkycureSkycure – Real-Time Mobile
•• CyActiveCyActive – Acquired by Paypal
•• WaterfallWaterfall –– Control Security
•• 6Scan6Scan –– Website Security
•• MinerEyeMinerEye – Self-Learning Tool
-- ““Innovative”Innovative” CybersecurityCybersecurity BusinessBusiness --
“AI & Machine Learning Solutions”“AI & Machine Learning Solutions”
•• Darktrace (UK)Darktrace (UK) –– Enterprise Immune System – Real-
Time Modelling of Traffic, Nodes & Users
•• DB Networks (US)DB Networks (US) –– Real-Time Advanced Threat
Database Analytics & Cybersecurity
•• CylanceCylance (US)(US) –– Next Generation Anti-Virus and
Enterprise Advanced Threat Protection
89CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• CylanceCylance (US)(US) –– Next Generation Anti-Virus and
Enterprise Advanced Threat Protection
•• PrelertPrelert (US)(US) – Behavioural Analytics Platform for
Detection of Database Threats & Anomalies
•• MinerEyeMinerEye (Israel)(Israel) –– “Self-Learning” Data Loss
Prevention with In-Depth Intelligent Classification
•• LogRhythmLogRhythm (US)(US) – “Machine Learning” Log Forensics
Darktrace:Darktrace: Cyber Intelligence PlatformCyber Intelligence Platform
90CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
LogRhythmLogRhythm:: Machine Learning ForensicsMachine Learning Forensics
91CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
LogRhythm’sLogRhythm’s Security Intelligence PlatformSecurity Intelligence Platform
Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling
92CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
“Smart Analysis Tools”“Smart Analysis Tools”:: 4D Simulation Modelling4D Simulation Modelling
for Hybrid Terror Alert & Disaster Managementfor Hybrid Terror Alert & Disaster Management
93CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Cyber Solutions from CorporationsCyber Solutions from Corporations
-- Consultancy, Networking and ServicesConsultancy, Networking and Services --
•• SophosSophos Group (UK)Group (UK)––Security Solutions
•• CISCOCISCO –– Threat Protection Security
•• Northrop GrummanNorthrop Grumman – Cyber &
Homeland Security Services
•• PwCPwC – Cyber Consultancy
•• Intel Security Group (McAfee)Intel Security Group (McAfee) –
•• Symantec (US)Symantec (US) –– Security Solutions
•• KasperskyKaspersky Lab(RU)Lab(RU) – Security Solutions
•• BAE SystemsBAE Systems – Cyber Risk Management
•• IBMIBM – Enterprise Solutions & Services
•• DeloitteDeloitte – Cyber Consultancy
•• RaytheonRaytheon – Cyber & Homeland Security
94CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Intel Security Group (McAfee)Intel Security Group (McAfee) –
Malware & Threat Protection
•• British TelecomBritish Telecom – Security Mgt
•• Juniper NetworksJuniper Networks –Threat Intel,
Protection and Network Security
•• Ernst YoungErnst Young – Cyber Consultancy
•• Booz Allen and HamiltonBooz Allen and Hamilton – Cyber
Consultancy, Solutions & Services
•• RaytheonRaytheon – Cyber & Homeland Security
Services (USA + Global)
•• ThalesThales – Secure IT Solutions
•• Lockheed MartinLockheed Martin –Cyber Solutions
•• Dell Secure NetworksDell Secure Networks – Managed
Network & Computing Security Services
•• AT&TAT&T-Network Security & Services
•• HPHP – Enterprise Cybersecurity Solutions
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
95CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 88 –– Mergers, Acquisitions and VC FundsMergers, Acquisitions and VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
Mergers & Acquisitions: 2014/2015Mergers & Acquisitions: 2014/2015
-- Cybersecurity Business SectorCybersecurity Business Sector --
•• PayPalPayPal: CyActive-$60m,
Fraud Sciences - $169m
•• SplunkSplunk: Caspida - $190m
•• RaytheonRaytheon: Websense-
$1.9Bn, and Blackbird
•• BAEBAE: SilverSky - $233m
•• GemaltoGemalto: SafeNet - $890m
•• VeritasVeritas: Beyond Trust
Software - $310m
96CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
$1.9Bn, and Blackbird
Technologies - $420m
•• FortinetFortinet: Meru - $44m
•• ElbitElbit SystemsSystems: CyberBit
•• Bain CapitalBain Capital: Blue Coat
Systems - $2.4Bn
Software - $310m
•• AVGAVG: Location Labs -$220m
•• SingtelSingtel: Trustwave - $810m
•• GTTGTT: MegaPath-$152m
•• IBM:IBM: LightHouse Security
•• CISCOCISCO: NeoHapsis
Venture Capital InvestmentsVenture Capital Investments
Cybersecurity Business: 2014Cybersecurity Business: 2014--20152015
•• CrowdstrikeCrowdstrike:: $100m
•• CylanceCylance:: $42m
•• ZiftenZiften:: $24m
•• CheckmarxCheckmarx:: $84m
•• Ionic Security:Ionic Security: $140m
•• IllumioIllumio:: $100m
•• Looking Glass:Looking Glass: $20m
•• Ping Identity:Ping Identity: $35m
•• Vector Nets:Vector Nets: $25m
•• LookOutLookOut:: $150m
97CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Ionic Security:Ionic Security: $140m
•• iSIGHTiSIGHT:: $30m
•• DB Networks:DB Networks: $17m
•• ThreatStreamThreatStream:: $22m
•• Darktrace:Darktrace: $18m
•• LookOutLookOut:: $150m
•• vARMOURvARMOUR:: $21m
•• BitGlassBitGlass:: $25m
•• SkycureSkycure:: $11m
•• VenafiVenafi:: $39m
Around $2Billion VC Funds Invested inAround $2Billion VC Funds Invested in CyberSecurity CompaniesCyberSecurity Companies –– 2014/20152014/2015
1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth
4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning
2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025
98CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
4 – CSO: C-Suite Security Integration
“Integrated”“Integrated”
5 – Scenario 2020: Internet of Things (IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025: AI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 99 –– YOURYOUR Action Plan for 21stC Cyber!....Action Plan for 21stC Cyber!....
1990 <1990 <–– 20152015 ––> 2040:> 2040: Next 25 YearsNext 25 Years
•• IoT:IoT: Global Connected “Internet of Things” – All On-Line
Intelligent Devices across ALLALL sectors & geographies.
•• “The Bad Cyber Guys” :“The Bad Cyber Guys” : Professionally Trained Cyber Criminals
and Cyber Terrorists operating World Wide!
•• Augmented Reality:Augmented Reality: Emergence & Full Deployment of 4D
Immersive Virtual Augmented Reality (a la Matrix Movies(a la Matrix Movies)
•• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in
99CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in
ALL intelligent devices, servers, data & network nodes
•• OnOn--LineLine CyberPoliceCyberPolice:: Cyber Bot Avatars patrolling as Virtual
Cyber Police Force across “Internet of Things”“Internet of Things”
.....Meet the Long Term Challenge of Deploying AI & Machine
Learning Based Cybersecurity Tools across YOUR Enterprise!YOUR Enterprise!
100CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility
YOUR Action Plan forYOUR Action Plan for Advanced “Cyber”!Advanced “Cyber”!
•• Action 1:Action 1: Board-Level Review & Audit of current
Cybersecurity Tools & Operations – 60 days
•• Action 2:Action 2: Highlight security issues & insecure
legacy net assets, devices & processes – 30 days
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
101CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
Roadmap for Advanced “Cyber” to include:
a) Cyber-Physical Operational Integration
b) IoT Security for both Legacy & New Assets
c) Training and Testing of AI-based “Cyber” Tools.
2121ststC Cybersecurity TrendsC Cybersecurity Trends2121ststC Cybersecurity TrendsC Cybersecurity Trends
102CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
*21*21ststC Cybersecurity Trends*C Cybersecurity Trends*
“CyberVision: 2015“CyberVision: 2015--2025”2025”
103CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
104CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
105CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Download:Download: www.valentina.net/DigiTec2012/
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Thrust SSC)Supersonic Car (Thrust SSC) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – Thrust SSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
106CyberVision : 2015CyberVision : 2015 -- 20252025
*** 21stC Cybersecurity Trends ***
London, UK :: 15th December 2015
© Dr David E. Probert : www.VAZA.com ©
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. ProbertDr David E. Probert is a Fellow of theis a Fellow of the Royal Statistical SocietyRoyal Statistical Society. He has a 1. He has a 1stst Class Honours Degree in MathematicsClass Honours Degree in Mathematics
(Bristol University) & PhD from(Bristol University) & PhD from Cambridge UniversityCambridge University in Selfin Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his Full Professional Biography is featured in the Marquis Directory ofand his Full Professional Biography is featured in the Marquis Directory of Who’s Who in the WorldWho’s Who in the World: 2007: 2007--2016.2016.

Más contenido relacionado

La actualidad más candente

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity PredictionsNyotron
 

La actualidad más candente (20)

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 

Destacado

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez) Ed Valdez
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitSecurity Innovation
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsSecurity Innovation
 
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldAutonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldMahbubul Alam
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Matthew Rosenquist
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesKurt Hagerman
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)U.S. News Healthcare of Tomorrow
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersModern Healthcare
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical DevicesExtreme Networks
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsHCL Technologies
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizonteam-WIBU
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Destacado (20)

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
 
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldAutonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of Hackers
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber Threats
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 

Similar a 21st Century Cybersecurity Trends

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesSaeed Al Dhaheri
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersRick Huijbregts
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessHappiest Minds Technologies
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...Ovum
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoTCisco Canada
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptxjaspreetkaur908049
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptxSabahat Waheed
 
IoT - A Next Big Thing
IoT - A Next Big ThingIoT - A Next Big Thing
IoT - A Next Big ThingKarl Seiler
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 

Similar a 21st Century Cybersecurity Trends (20)

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Latest Trends in Information Technology - 2020
Latest Trends  in Information Technology - 2020Latest Trends  in Information Technology - 2020
Latest Trends in Information Technology - 2020
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and Partners
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
IoT - A Next Big Thing
IoT - A Next Big ThingIoT - A Next Big Thing
IoT - A Next Big Thing
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 

Más de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Más de Dr David Probert (8)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Último (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

21st Century Cybersecurity Trends

  • 1. *21*21ststC Cybersecurity Trends*C Cybersecurity Trends* “CyberVision: 2015“CyberVision: 2015--2025”2025” 1CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © “CyberVision: 2015“CyberVision: 2015--2025”2025” -- Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security –– Dr David E. ProbertDr David E. ProbertDr David E. ProbertDr David E. Probert
  • 2. “CyberVision:“CyberVision: 20152015 –– 2025”2025” •• My Vision:My Vision: My Personal “CyberVision”“CyberVision” develops practical scenarios for the next 10 Year Evolution of Cybersecurity •• World Transition:World Transition: From 2020ththC PhysicalC Physical to 2121ststC Cyber WorldC Cyber World •• AI Evolution:AI Evolution: Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security •• Marketplace:Marketplace: The Global CybersecuritCybersecurity Business Sector is forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025 2CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025 •• CybersecurityCybersecurity is at the Core of 21stC Society: ProActive Real-Time Defence against Worldwide 24/7 Threats from *** CyberTerrorism, Cyber Crime & Cyber Warfare ***CyberTerrorism, Cyber Crime & Cyber Warfare *** ... We need to fully embed Intelligent & AdaptiveWe need to fully embed Intelligent & Adaptive Cybersecurity within theCybersecurity within the “Internet of Things”“Internet of Things”
  • 3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 3CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World!! ......
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World!! ......
  • 5. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity -- “Worldwide Internet Census 2012”“Worldwide Internet Census 2012” -- 5CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 6. 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 11 –– Background:Background: “21st Security Landscape”“21st Security Landscape” 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 6CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 7. Background:Background: 2020thth to 21to 21ststC CybersecurityC Cybersecurity •• 2020ththC : 1995C : 1995 -- 2010 :2010 : Focus on Firewalls & Antivirus – based upon Physical “Spatial” Security Models (Castles & Moats) .........Protection @Protection @ “Speed of Sound”“Speed of Sound” ((SpaceSpace)) 7CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © .........Protection @Protection @ “Speed of Sound”“Speed of Sound” ((SpaceSpace)) •• 2121ststC : 2010C : 2010 –– 2025 :2025 : Focus on Adaptive, and Self-Organising “Cyber” Tools – based upon Temporal Models (AI & Machine Learning) .........Defending @Defending @ “Speed of Light”“Speed of Light” ((TimeTime))
  • 8. 2121ststCC CyberSecurityCyberSecurity LandscapeLandscape •• Convergence of Physical & Cybersecurity OperationsConvergence of Physical & Cybersecurity Operations •• “Cyber” migrates from IT Dept to Main Board: C“Cyber” migrates from IT Dept to Main Board: C--SuiteSuite •• Global RealGlobal Real--Time Targeted Cyber AttacksTime Targeted Cyber Attacks –– 24/724/7 •• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to 8CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to “Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning) •• Emergence of Enterprise “Internet of Things”Emergence of Enterprise “Internet of Things” •• Evolution of Smart Devices, Cities, Economy & SocietyEvolution of Smart Devices, Cities, Economy & Society •• Dramatic increase in Cyber Crime & Cyber TerrorismDramatic increase in Cyber Crime & Cyber Terrorism
  • 9. CybersecurityCybersecurity Market SectorsMarket Sectors •• AntiAnti--Virus/FirewallVirus/Firewall •• ID AuthenticationID Authentication •• Encryption/PrivacyEncryption/Privacy •• Risk & ComplianceRisk & Compliance •• Mobile Device SecurityMobile Device Security •• AI & Machine LearningAI & Machine Learning •• Enterprise IoT SecurityEnterprise IoT Security •• Cloud Security ServicesCloud Security Services •• Big Data ProtectionBig Data Protection •• RT Log/Event AnalyticsRT Log/Event Analytics 9CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Mobile Device SecurityMobile Device Security •• AntiAnti--Fraud MonitoringFraud Monitoring •• Website ProtectionWebsite Protection •• S/W Code VerificationS/W Code Verification •• RT Log/Event AnalyticsRT Log/Event Analytics •• RealReal--Time Threat MapsTime Threat Maps •• Smart BiometricsSmart Biometrics •• Training & CertificationTraining & Certification Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services... ....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
  • 10. 1 – Background: 21stC Security Landscape 22 –– CybersecurityCybersecurity –– Players & ThreatsPlayers & Threats 3 – Cyber Market Structure, Size & Growth 4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 10CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 11. Friday 23Friday 23rdrd Oct 2015Oct 2015 11CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © MajorMajor CyberCyber--AttackAttack UK Internet Service ProviderUK Internet Service Provider EstimatedEstimated $$$$$$ Loss =Loss = $55$55 MillionMillion
  • 12. 1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne 12CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © £1.9bn Cybercrime Budget£1.9bn Cybercrime Budget UK National Cyber CentreUK National Cyber Centre National Cyber Crime UnitNational Cyber Crime Unit
  • 13. Typical GlobalTypical Global“Botnet”“Botnet” Cyber AttackCyber Attack 13CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Wired Magazine – Summer 2007
  • 14. Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers -- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” -- 14CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 15. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity Index (Dec 2014)Index (Dec 2014) 15CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 16. Map ofMap of RecentRecent Malicious Activity inMalicious Activity in “Cyberspace”“Cyberspace” 16CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © www.team-cymru.org : - Malicious Activity over 30 daysMalicious Activity over 30 days -- Sept 2014Sept 2014
  • 17. Worldwide : 2012Worldwide : 2012 -- IPv4 Census MapIPv4 Census Map -- 17CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 18. Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012 18CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 19. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1) 19CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 20. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2) 20CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 21. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3) 21CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 22. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4) 22CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
  • 23. 20152015--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 23CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 24. Contrast between our Physical & Cyber WorldsContrast between our Physical & Cyber Worlds Convergence to 21Convergence to 21ststC “Intelligent Worlds” will take time!C “Intelligent Worlds” will take time! Physical World = “Space”Physical World = “Space” • Top-Down • Dynamic • Secrecy • Territorial – “Geographical Space” • Government Power • Control • Direct Cyber World = “Time”Cyber World = “Time” • Bottom-Up • Self-Organising • Transparency • Global – “Real-Time” • Citizen Power • Freedom • Proxy 24CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © • Direct • Padlocks & Keys • Convergent • Hierarchical • Carbon Life • Tanks & Missiles • Mass Media • Proxy • Passwords & Pins • Divergent • Organic • Silicon Life • Cyber Weapons & “Botnets” • Social Media “Smart Security”“Smart Security” will require Embedded Networked Intelligence in ALL future IoT deviceswill require Embedded Networked Intelligence in ALL future IoT devices
  • 25. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19951995--20152015 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 25CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security RisksHigh Security Risks:: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
  • 26. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19951995--20152015 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 26CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security RisksHigh Security Risks:: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning! Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
  • 27. MainMain CyberCyber Players and their MotivesPlayers and their Motives •• Cyber Criminals:Cyber Criminals: Seeking commercial gain from hacking banks & financial institutions as well a phishing scams & computer ransom ware •• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical assets, and national infrastructure for aims relating to political power & “branding” •• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to 27CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to penetrate both corporate & military data servers in order to obtain plans & intelligence •• CyberCyber HackivistsHackivists:: Groups such as “Anonymous” with Political Agendas that hack sites & servers to virally communicate the “message” for specific campaigns
  • 28. CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios •• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to allow theft or corruption of Cyber Information / IT DataBases and Confidential Plans •• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls & IT Databases to allow Criminals/Terrorists to enter Target Facilities (such as Military Bases, Banking HQ, Telco/Mobile Network Operations) 28CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Network Operations) •• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the weakest links which in the 21stC will be BOTH Cyber Network Operations and Physical Security Ops .......Cyber AttacksCyber Attacks are now fully industrialised with Malicious Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKNETDARKNET
  • 29. AnonymousAnonymous--Hacktivists declareHacktivists declare “Total War”“Total War” onon ISISISIS afterafter Paris AttacksParis Attacks –– 1616thth Nov 2015Nov 2015 29CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 30. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 30CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C!Classic Works on “War” are as relevant today for Cybersecurity as preClassic Works on “War” are as relevant today for Cybersecurity as pre--2121ststC!C! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists!
  • 31. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 33 –– CyberCyber Market Structure, Size & GrowthMarket Structure, Size & Growth 4 - CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 31CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 - CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 32. CybersecurityCybersecurity Market Size & GrowthMarket Size & Growth •• 2015:2015: Worldwide EstimatedWorldwide Estimated - $97$97 Billion •• 2020:2020: Worldwide ProjectedWorldwide Projected - $170$170 Billion –– North America:North America: - $64Bn – 10.0% CAGR (38%) –– Europe:Europe: - $39Bn – 7.2% CAGR (23%) –– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%) 32CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © –– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%) –– Middle East & Africa:Middle East & Africa: - $15Bn – 13.7% CAGR (9%) –– Latin America:Latin America: - $14Bn –17.6% CAGR (8%) (SourcesSources: “Micro Market Monitor” & “Markets and Markets” – Estimated and Extrapolated from projections for 20142014 –– 20192019) •• 2025:2025: WorldwideWorldwide @ 10% CAGR - $275$275 Billion
  • 33. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 44 –– CSO: CCSO: C--Suite Security IntegrationSuite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 33CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 44 –– CSO: CCSO: C--Suite Security IntegrationSuite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 34. CSO:CSO: Board Level Security IntegrationBoard Level Security Integration •• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security managed with minimal common operations •• 2121ststC CSO Model:C CSO Model: Business & Government urgently need to manage TOTAL Cyber- 34CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © urgently need to manage TOTAL Cyber- Physical Operations at C-Suite Board Level •• Investment Plan:Investment Plan: CSOs need professional team & Investment Budget to manage physical & cyber security risks, threats and attacks!
  • 35. CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations •• CybersecurityCybersecurity for Government, Business & Critical Sectors can now be integrated with operational physical security solutions including: 1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities 2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Traffic & Parking 3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with CCTV & Alarm Control Centres 4)4) Personnel RFIDPersonnel RFID and BiometricsBiometrics for Office, Warehouse & Campus Access Controls 5) Professionally trained Security Personnel & GuardsSecurity Personnel & Guards – 24/7 – for top security facilities 6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors 35CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors 7)7) Intelligent PerimeterIntelligent Perimeter security controls for campuses and critical service facilities such as airports, power stations, refineries, hospitals and government institutions 8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities 9) Focus upon in-depth Access ControlAccess Control for computer server rooms & data storage “Integrated Real“Integrated Real--TimeTime CyberCyber--PhysicalPhysical Security Operations”Security Operations” “SMART SECURITY”“SMART SECURITY”
  • 36. Integration of Physical and CybersecurityIntegration of Physical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 36CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Shopping List!Shopping List! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
  • 37. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 37CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 55 –– ScenarioScenario 2020: Internet of Things (IoT)2020: Internet of Things (IoT) ”Adaptive””Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 38. Our CyberVision:Our CyberVision: 20202020 -- 20252025 •• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoTIoT:: Managed Integration of IoT, Cyber & Physical Ops under CSO 38CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• ScenarioScenario 20252025 –– Intelligent SecurityIntelligent Security:: Transition to Real-Time Artificial Intelligence & Machine Learning based Enterprise Cybersecurity Tools & Solutions
  • 39. ScenarioScenario 2020:2020: Adaptive SecurityAdaptive Security -- IoTIoT • ....5 Year Time Window - 2010 <2010 <–– 20152015 --> 2020> 2020 • Integrated CyberCyber--Physical SecurityPhysical Security deployed & managed by Board Level Chief Security Officer •• International StandardsInternational Standards for “IoT” APIs, Net Interface, Security Standards & Operations 39CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• International StandardsInternational Standards for “IoT” APIs, Net Interface, Security Standards & Operations •• Distributed SecurityDistributed Security for “Legacy”“Legacy” Network Assets & Devices for the “Internet of Things” • Trial Deployment of Advanced AIAdvanced AI--basedbased Intelligent & Adaptive Cybersecurity Tools
  • 40. EnterpriseEnterprise “Internet of Things”“Internet of Things”-- IoTIoT •• CyberCyber--Enterprise:Enterprise: During the next 5-10 years of Cyber Evolution the Internet will extend to practically ALL our IT enabled devices within cars, homes, offices, power stations & retail products! This is defined as the “Internet of Things” – IoT. 40CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © This is defined as the “Internet of Things” – IoT. •• Extended Security:Extended Security: ALL IoT connected devices, nodes & servers must be secured against attack! •• CSO Challenge:CSO Challenge: The IoT is the next Cyber Conflict Zone and Security Challenge for Enterprise CSOs!
  • 41. Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution 41CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 42. Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors 42CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 43. CyberCyber--PhysicalPhysical Threats from the “IoT”Threats from the “IoT” •• ALL Networked DevicesALL Networked Devices are at risk from Cyber-Hacking, Penetration & Remote Control •• IoT Devices:IoT Devices: Smart Phones, Home Controls, Vehicles, Industrial Controls, Smart Cities, 43CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Vehicles, Industrial Controls, Smart Cities, Power Stations, Utilities, Medical Devices..... •• Legacy Assets:Legacy Assets: Many legacy assets including cars, medical implants, industrial controls are still inherently INSECUREINSECURE against cyberattacks!
  • 44. PracticalPractical Security SolutionsSecurity Solutions for thefor the “IoT”“IoT” •• European UnionEuropean Union -- IERC:IERC: Extensive “IoT” research during the last 5 years including security. •• IEEE IoT Community, Journal & Conference :IEEE IoT Community, Journal & Conference : Recent international focus upon IoT Security 44CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Recent international focus upon IoT Security Standards and Engineering Practical Solutions. •• Advanced Cyber Tools:Advanced Cyber Tools: Sustainable IoT Network Security requires innovative 21stC Adaptive & Self-learning tools based upon research into Artificial Intelligence and Machine Learning.
  • 45. Internet of Things:Internet of Things: Business AlliancesBusiness Alliances 45CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 46. -- Security for theSecurity for the Internet of ThingsInternet of Things -- Security & Privacy inSecurity & Privacy in HyperconnectedHyperconnected SocietySociety 46CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 47. CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT” 47CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 48. EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020 48CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 49. Cyber 2020 Visions:Cyber 2020 Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton and The Australian Government (Defence)and The Australian Government (Defence) 49CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 50. 1 – Background: 21stC Security Landscape 2 – – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 66 –– Scenario 2025: AI & Machine LearningScenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 50CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 66 –– Scenario 2025: AI & Machine LearningScenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 51. ScenarioScenario 20252025:: Intelligent SecurityIntelligent Security • ..10 Year Time Window - 2005 <2005 <–– 20152015 --> 2025> 2025 • Transition & Full Deployment of Enterprise- Wide AI-based IntelligentIntelligent “Cyber” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net 51CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both traditional & advanced AI-based “Cybersecurity Tools”
  • 52. CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios *** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon *** 52CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 53. 53CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Microsoft 2025:Microsoft 2025: Cyberspace ScenariosCyberspace Scenarios
  • 54. Technology Visions:Technology Visions: ScenarioScenario 20252025 54CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
  • 55. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new 55CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• ZeroZero--Day Attacks:Day Attacks: AI modelling can mitigate risks of new malware that can no defined “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 56. ....“Machine Learning Methods”....“Machine Learning Methods” forfor Cybersecurity developed fromCybersecurity developed from 2010...2010... 56CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Since 2010, leading Cybersecurity Specialists have explored AI & Machine Learning to mitigate cyber threats & attacks!
  • 57. Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 57CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 58. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge University :Cambridge University : 19731973 -- 19761976 58CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 59. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 59CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 60. SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences •• Organic DNAOrganic DNA--based Life has adaptation, learningbased Life has adaptation, learning & intelligence based upon self& intelligence based upon self--organisation:organisation: –– Bee HivesBee Hives with regular Honeycombs –– Ant ColoniesAnt Colonies & Termite Hills –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations 60CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations –– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids –– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security –– Mammalian BrainsMammalian Brains evolved from Neural Networks ....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
  • 61. SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems” 61CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 62. -- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! -- The Sociable Weaver Bird “World’s largest Bird Nests” *** Southern Africa *** 62CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •Secure Living Community •Self-Organising Architecture •Fully scalable for long term growth •Supports 250+ Weaver Birds •Real-Time Disaster Alert System •Sustainable in Semi-Desert Steppe •Robust against “Enemy Risks” such as Eagles, Vultures & Snakes ...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
  • 63. “Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator: -- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) -- 63CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 64. Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator ....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities” Dynamic Duffing Equation: - Exhibits Chaotic Behaviour 64CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 65. 2D Super2D Super--Cyclic Cellular Automaton:Cyclic Cellular Automaton: -- Emergence of Patterns from Random ChaosEmergence of Patterns from Random Chaos -- 65CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 66. Cellular Automata:Cellular Automata: “Games of Life”“Games of Life” 66CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 67. “Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set 67CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 68. ““Machine LearningMachine Learning Algorithms”Algorithms” 68CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 69. MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl” 69CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
  • 70. 1984: “Birth” of Intelligent Networks1984: “Birth” of Intelligent Networks andand “Death” of Personal Privacy“Death” of Personal Privacy ?? 70CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 71. -- City Business SystemsCity Business Systems –– British TelecomBritish Telecom –– Launch of RealLaunch of Real--Time Financial Trading:Time Financial Trading: 19841984 71CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 72. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 72CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Algorithmic Computer Trading using Real-Time Neural Nets & Statistical Maths Tools have been used for 20+ Years! .....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent realreal--time forecasts for Enterprise Cybersecurity Threats!time forecasts for Enterprise Cybersecurity Threats!
  • 73. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 73CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 74. Towards 2025 :Towards 2025 : ““Smart Security Solutions”Smart Security Solutions” • The Application of Artificial Intelligence and Machine Learning allows us to develop “Smart Security Solutions”“Smart Security Solutions” as follows: ……..……..”Smart Security Solutions””Smart Security Solutions” typically possess the following features:typically possess the following features: 1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks 2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 74CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale in space & time from micro cells to macro solutions 6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from Global Social Networks, Search & On-Line Trade & Commerce 7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations ………Now we’ll consider how “………Now we’ll consider how “AI & Machine Learning”AI & Machine Learning” principles are being engineered intobeing engineered into 2121ststC Cybersecurity Solutions & Services...C Cybersecurity Solutions & Services...
  • 75. Building our 2025Building our 2025 Smart SecuritySmart Security ToolkitToolkit (1) Smart(1) Smart DecisionDecision PrinciplesPrinciples -- “D“D--Genes”Genes” •• Business DecisionsBusiness Decisions require focusing & filtering of Big Data sources in Space-Time to create local knowledge (Data Mining). Hence a useful metaphor is the “Knowledge Lens”:“Knowledge Lens”: – Smart Decision “Genes”“Genes” = Space, Time and Information Focus – Conceptual ““Knowledge Lens”Knowledge Lens” can filter and focus information in “Space” from searching Big Data Sets to a Small focused Short-List 75CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © “Space” from searching Big Data Sets to a Small focused Short-List – The “Knowledge Lens”“Knowledge Lens” can focus information & present in real-time, possibly as an stream of multi-media news or market intelligence •• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle in the design of Smart SecuritySmart Security, Smart Business & Smart Governance ....21stC....21stC Cyber AttacksCyber Attacks occur in Realoccur in Real--TimeTime @Optical Speeds@Optical Speeds so ultra fast analysis, decisions and action is a must!so ultra fast analysis, decisions and action is a must!
  • 76. Building our 2025Building our 2025 Smart SecuritySmart Security ToolkitToolkit (2) Smart(2) Smart LearningLearning PrinciplesPrinciples -- “L“L--Genes”Genes” •• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and Scalable Architecture. The Decision “Genes” are relatively traditional whilst these new Learning “Genes” lie at the heart of Smart Security. –– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems and communities which include the well known self- organisation of insect roles in communities such as ants & bees. –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from 76CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple mathematical rules, as in Conway’s “Game of Life”“Game of Life” –– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in complex chaotic behaviour as found in real world insect populations –– Scalable ArchitectureScalable Architecture is also an essential feature of plants & animal life & Mandelbrot’s theory of Fractal Curves provides vivid examples. .....Current Trends:.....Current Trends: Research into AI, Machine Learning, Self-Organisation & Adaptation remains highly active in both Universities & Commercial R&D Labs
  • 77. Hybrid 21Hybrid 21ststC Business OrganisationC Business Organisation -- Hierarchical & OrganicHierarchical & Organic -- •• TransitionTransition from 20thC to 21stC Business, Governance & Security requires fundamental re-structuring of operations: –– 2020ththC Industrial Organisations:C Industrial Organisations: Hierarchical Bureaucracies (Pyramids) to manually process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer 77CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 2121 C Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds” •• Living SystemsLiving Systems, such as Mammals, use Hybrid Organisation of their extended nervous system (Brain & BodyBrain & Body) to optimise real- time learning and effective environmental adaptation! •• Smart Security SolutionsSmart Security Solutions will also require HybridHybrid organisation to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
  • 78. 20252025 : Designing “: Designing “Smart Security”Smart Security” •• Smart Security SolutionsSmart Security Solutions all use combinations of these Basic ICT Learning & Decision “genes” shared with Intelligent Living Systems: 1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked) 2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time & Decision Focus 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 78CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 4)4) Smart Security Solutions and Services:Smart Security Solutions and Services: Integration of Decision and Learning “Genes”, within Secure & Resilient Systems Environment .....Using “.....Using “AI & Machine Learning”AI & Machine Learning”,, 2121ststC Cyber Ventures are nowC Cyber Ventures are now marketing “Smart”marketing “Smart” SelfSelf--Learning CybersecurityLearning Cybersecurity Tools to secureTools to secure Enterprises, Government & Critical Information InfrastructureEnterprises, Government & Critical Information Infrastructure!!
  • 79. BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040 79CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 80. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense:: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 80CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 81. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 81CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
  • 82. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 82CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © DeployDeploy LightLight--Speed “AISpeed “AI--Neural Security”Neural Security” against the 24/7 Attacks fromagainst the 24/7 Attacks from ““Bad Cyber GuysBad Cyber Guys””
  • 83. Scenario 2040: CyberScenario 2040: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 83CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 84. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 84CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 77 –– CybersecurityCybersecurity Ventures (Old and New)Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 9 –YOUR Actions Plan for 21stC Cyber!....
  • 85. Cybersecurity CompaniesCybersecurity Companies -- USAUSA •• FireEyeFireEye –– Next Generation Security •• NorseNorse –– In-Depth Real-Time Intel •• CylanceCylance –– AI/ML Threat DetectionAI/ML Threat Detection •• DB NetworksDB Networks –– Real-Time ML Defence LanCopeLanCope –– Security Threat IntelligenceSecurity Threat Intelligence •• AlienVaultAlienVault –– Intelligent Security •• RSARSA –– Big Data & Cloud Security • Palantir –Analytics & Fraud • Daon – Biometics & ID Mgt • Akamai –Cloud & Mobile • Qualys – Cloud Security • Blue Coat – Business AssuranceBusiness Assurance • Arbor Networks – DDoS Attack • Zscaler – Security Services 85CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• RSARSA –– Big Data & Cloud Security •• VeraCodeVeraCode –– Secure Code Analytics •• Palo Alto NetworksPalo Alto Networks –– Next Gen Cyber •• Resilient SystemsResilient Systems –– Auto Threat Alert •• PrelertPrelert –– Machine Learning Solutions • Barracuda Networks – Firewalls+ • Zscaler – Security Services • Sonatype – Enterprise Security • Okta –Identity Management • Skybox Security –Risk Analytics • LogRhythm – Log Mgt Analytics • PKWare – Data Encryption USA/CanadaUSA/Canada is estimated to beis estimated to be 38% ($37Bn)38% ($37Bn) of Globalof Global CyberSecurityCyberSecurity MarketplaceMarketplace
  • 86. Norse Corporation:Norse Corporation: Intelligence ServiceIntelligence Service 86CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Link:Link: map.ipviking.commap.ipviking.com -- Norse CorporationNorse Corporation
  • 87. New Cybersecurity CompaniesNew Cybersecurity Companies -- UKUK •• DarkTraceDarkTrace – Machine Learning •• AvectoAvecto – Endpoint Security •• AcunetixAcunetix –Vulnerability Scanner •• PortSwiggerPortSwigger – Web Security •• WanderaWandera –Secure Mobile Portal •• ClearswiftClearswift – Big Data Security •• SiloBreakerSiloBreaker – Risk Analytics •• SentryBaySentryBay -Mobile & IoT •• Swivel SecureSwivel Secure -Authentication •• Digital ShadowsDigital Shadows - Cyber Intel 87CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• WanderaWandera –Secure Mobile Portal •• SentryBaySentryBay –Mobile, IoT Security •• CiticusCiticus – Risk & Compliance Mgt •• ProtectimusProtectimus - 2-Factor Security •• Digital ShadowsDigital Shadows - Cyber Intel •• Smooth WallSmooth Wall - Threat Mgt •• BeCryptBeCrypt-Mobile Data Security •• AcuityAcuity – Compliance & Risk Mgt
  • 88. Cybersecurity CompaniesCybersecurity Companies -- IsraelIsrael •• CyberArkCyberArk –(NASDAQ – CYBR) •• CheckPointCheckPoint –(NASDAQ–CHKP) •• ElbitElbit SystemsSystems -- (NASDAQ –ESLT) •• CheckMarxCheckMarx – Code Analytics SeculertSeculert – Attack Detection •• RadwareRadware -- (NASDAQ – RDWR) •• Light CyberLight Cyber – Threat Detection •• GreenSQLGreenSQL – Secure Database •• GuardiCoreGuardiCore – Server Security CyActiveCyActive – Acquired by Paypal 88CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• SeculertSeculert – Attack Detection •• SentrixSentrix – Cloud DMZ Firewall •• TrapXTrapX –– “HoneyPot” Solutions •• SkycureSkycure – Real-Time Mobile •• CyActiveCyActive – Acquired by Paypal •• WaterfallWaterfall –– Control Security •• 6Scan6Scan –– Website Security •• MinerEyeMinerEye – Self-Learning Tool
  • 89. -- ““Innovative”Innovative” CybersecurityCybersecurity BusinessBusiness -- “AI & Machine Learning Solutions”“AI & Machine Learning Solutions” •• Darktrace (UK)Darktrace (UK) –– Enterprise Immune System – Real- Time Modelling of Traffic, Nodes & Users •• DB Networks (US)DB Networks (US) –– Real-Time Advanced Threat Database Analytics & Cybersecurity •• CylanceCylance (US)(US) –– Next Generation Anti-Virus and Enterprise Advanced Threat Protection 89CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• CylanceCylance (US)(US) –– Next Generation Anti-Virus and Enterprise Advanced Threat Protection •• PrelertPrelert (US)(US) – Behavioural Analytics Platform for Detection of Database Threats & Anomalies •• MinerEyeMinerEye (Israel)(Israel) –– “Self-Learning” Data Loss Prevention with In-Depth Intelligent Classification •• LogRhythmLogRhythm (US)(US) – “Machine Learning” Log Forensics
  • 90. Darktrace:Darktrace: Cyber Intelligence PlatformCyber Intelligence Platform 90CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 91. LogRhythmLogRhythm:: Machine Learning ForensicsMachine Learning Forensics 91CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © LogRhythm’sLogRhythm’s Security Intelligence PlatformSecurity Intelligence Platform
  • 92. Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling 92CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
  • 93. “Smart Analysis Tools”“Smart Analysis Tools”:: 4D Simulation Modelling4D Simulation Modelling for Hybrid Terror Alert & Disaster Managementfor Hybrid Terror Alert & Disaster Management 93CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 94. Cyber Solutions from CorporationsCyber Solutions from Corporations -- Consultancy, Networking and ServicesConsultancy, Networking and Services -- •• SophosSophos Group (UK)Group (UK)––Security Solutions •• CISCOCISCO –– Threat Protection Security •• Northrop GrummanNorthrop Grumman – Cyber & Homeland Security Services •• PwCPwC – Cyber Consultancy •• Intel Security Group (McAfee)Intel Security Group (McAfee) – •• Symantec (US)Symantec (US) –– Security Solutions •• KasperskyKaspersky Lab(RU)Lab(RU) – Security Solutions •• BAE SystemsBAE Systems – Cyber Risk Management •• IBMIBM – Enterprise Solutions & Services •• DeloitteDeloitte – Cyber Consultancy •• RaytheonRaytheon – Cyber & Homeland Security 94CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Intel Security Group (McAfee)Intel Security Group (McAfee) – Malware & Threat Protection •• British TelecomBritish Telecom – Security Mgt •• Juniper NetworksJuniper Networks –Threat Intel, Protection and Network Security •• Ernst YoungErnst Young – Cyber Consultancy •• Booz Allen and HamiltonBooz Allen and Hamilton – Cyber Consultancy, Solutions & Services •• RaytheonRaytheon – Cyber & Homeland Security Services (USA + Global) •• ThalesThales – Secure IT Solutions •• Lockheed MartinLockheed Martin –Cyber Solutions •• Dell Secure NetworksDell Secure Networks – Managed Network & Computing Security Services •• AT&TAT&T-Network Security & Services •• HPHP – Enterprise Cybersecurity Solutions
  • 95. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 95CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 88 –– Mergers, Acquisitions and VC FundsMergers, Acquisitions and VC Funds 9 – YOUR Actions Plan for 21stC Cyber!....
  • 96. Mergers & Acquisitions: 2014/2015Mergers & Acquisitions: 2014/2015 -- Cybersecurity Business SectorCybersecurity Business Sector -- •• PayPalPayPal: CyActive-$60m, Fraud Sciences - $169m •• SplunkSplunk: Caspida - $190m •• RaytheonRaytheon: Websense- $1.9Bn, and Blackbird •• BAEBAE: SilverSky - $233m •• GemaltoGemalto: SafeNet - $890m •• VeritasVeritas: Beyond Trust Software - $310m 96CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © $1.9Bn, and Blackbird Technologies - $420m •• FortinetFortinet: Meru - $44m •• ElbitElbit SystemsSystems: CyberBit •• Bain CapitalBain Capital: Blue Coat Systems - $2.4Bn Software - $310m •• AVGAVG: Location Labs -$220m •• SingtelSingtel: Trustwave - $810m •• GTTGTT: MegaPath-$152m •• IBM:IBM: LightHouse Security •• CISCOCISCO: NeoHapsis
  • 97. Venture Capital InvestmentsVenture Capital Investments Cybersecurity Business: 2014Cybersecurity Business: 2014--20152015 •• CrowdstrikeCrowdstrike:: $100m •• CylanceCylance:: $42m •• ZiftenZiften:: $24m •• CheckmarxCheckmarx:: $84m •• Ionic Security:Ionic Security: $140m •• IllumioIllumio:: $100m •• Looking Glass:Looking Glass: $20m •• Ping Identity:Ping Identity: $35m •• Vector Nets:Vector Nets: $25m •• LookOutLookOut:: $150m 97CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Ionic Security:Ionic Security: $140m •• iSIGHTiSIGHT:: $30m •• DB Networks:DB Networks: $17m •• ThreatStreamThreatStream:: $22m •• Darktrace:Darktrace: $18m •• LookOutLookOut:: $150m •• vARMOURvARMOUR:: $21m •• BitGlassBitGlass:: $25m •• SkycureSkycure:: $11m •• VenafiVenafi:: $39m Around $2Billion VC Funds Invested inAround $2Billion VC Funds Invested in CyberSecurity CompaniesCyberSecurity Companies –– 2014/20152014/2015
  • 98. 1 – Background: 21stC Security Landscape 2 – Cybersecurity: Players & Threats 3 – Cyber Market Structure, Size & Growth 4 – CSO: C-Suite Security Integration 5 – Scenario 2020: Internet of Things (IoT) 6 – Scenario 2025: AI & Machine Learning 2121ststC Cybersecurity Trends:C Cybersecurity Trends: 20152015 -- 20252025 98CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © 4 – CSO: C-Suite Security Integration “Integrated”“Integrated” 5 – Scenario 2020: Internet of Things (IoT) “Adaptive”“Adaptive” 6 – Scenario 2025: AI & Machine Learning “Intelligent”“Intelligent” 7 – CyberSecurity Ventures (Old and New) 8 – Mergers, Acquisitions & VC Funds 99 –– YOURYOUR Action Plan for 21stC Cyber!....Action Plan for 21stC Cyber!....
  • 99. 1990 <1990 <–– 20152015 ––> 2040:> 2040: Next 25 YearsNext 25 Years •• IoT:IoT: Global Connected “Internet of Things” – All On-Line Intelligent Devices across ALLALL sectors & geographies. •• “The Bad Cyber Guys” :“The Bad Cyber Guys” : Professionally Trained Cyber Criminals and Cyber Terrorists operating World Wide! •• Augmented Reality:Augmented Reality: Emergence & Full Deployment of 4D Immersive Virtual Augmented Reality (a la Matrix Movies(a la Matrix Movies) •• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in 99CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Universally Embedded Security:Universally Embedded Security: AI Cybersecurity Modules in ALL intelligent devices, servers, data & network nodes •• OnOn--LineLine CyberPoliceCyberPolice:: Cyber Bot Avatars patrolling as Virtual Cyber Police Force across “Internet of Things”“Internet of Things” .....Meet the Long Term Challenge of Deploying AI & Machine Learning Based Cybersecurity Tools across YOUR Enterprise!YOUR Enterprise!
  • 100. 100CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility
  • 101. YOUR Action Plan forYOUR Action Plan for Advanced “Cyber”!Advanced “Cyber”! •• Action 1:Action 1: Board-Level Review & Audit of current Cybersecurity Tools & Operations – 60 days •• Action 2:Action 2: Highlight security issues & insecure legacy net assets, devices & processes – 30 days •• Action 3:Action 3: Develop Multi-Year Plan, Budget & 101CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © •• Action 3:Action 3: Develop Multi-Year Plan, Budget & Roadmap for Advanced “Cyber” to include: a) Cyber-Physical Operational Integration b) IoT Security for both Legacy & New Assets c) Training and Testing of AI-based “Cyber” Tools.
  • 102. 2121ststC Cybersecurity TrendsC Cybersecurity Trends2121ststC Cybersecurity TrendsC Cybersecurity Trends 102CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 103. *21*21ststC Cybersecurity Trends*C Cybersecurity Trends* “CyberVision: 2015“CyberVision: 2015--2025”2025” 103CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com ©
  • 104. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 104CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 105. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 105CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Download:Download: www.valentina.net/DigiTec2012/
  • 106. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Thrust SSC)Supersonic Car (Thrust SSC) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – Thrust SSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 106CyberVision : 2015CyberVision : 2015 -- 20252025 *** 21stC Cybersecurity Trends *** London, UK :: 15th December 2015 © Dr David E. Probert : www.VAZA.com © Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. ProbertDr David E. Probert is a Fellow of theis a Fellow of the Royal Statistical SocietyRoyal Statistical Society. He has a 1. He has a 1stst Class Honours Degree in MathematicsClass Honours Degree in Mathematics (Bristol University) & PhD from(Bristol University) & PhD from Cambridge UniversityCambridge University in Selfin Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his Full Professional Biography is featured in the Marquis Directory ofand his Full Professional Biography is featured in the Marquis Directory of Who’s Who in the WorldWho’s Who in the World: 2007: 2007--2016.2016.