SlideShare una empresa de Scribd logo
1 de 25
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Surfing today’s emerging tech: A policy-based approach
James Stanger, PhD
CompTIA
Chief Technology
Evangelist
@jamesstanger
SACON 2020
Ambient computing – a wave that’s already here
• Context-aware computing – “Presencing 2.0”
• Intelligent tech monitors people (AI & ML)
• Information you generate and use moves from:
• Individuals to edge / cloud / data center
• Environment to environment
• Machine to machine
• Part of the 4th industrial revolution
• The result?
• Hyper-personalization - customer focus
• Data analytics and business intelligence
• Control (?)
SACON 2020
Emerging tech categories generating this wave through
2023
The above revenue drivers are also the building blocks of the ambient computing
world
SACON 2020
Data / information has become the critical skill area
SACON 2020
Unprecedented connectivity of (smart) things
• How is this data connected to 

emerging tech?
• How do we process this data into

information?
ICS
DCS
SCADA
OT
IoT
Sensors / actuators / radios
Gateway Data
AcquisitionEdge
AIData center
Storage
Application
Network
ServerML
SACON 2020
IoT / OT and next steps: Customer
experience (CX)
• The next steps are to:
• Transform “emerging tech” into

customer-centric solutions
• Make the architecture more efficient
How do we apply
AI

and ML IoT?
How do we turn this
into a customer-
focused solution?
What about 

serverless /
edge?Should we do
this?
SACON 2020
Cloud – finally being used
• After much talk, we’re seeing 

actual adoption over the past 5 years
• Another part of the “4th industrial 

revolution”
• Azure vs. Alibaba vs. AWS, and so forth:

It depends on your business model
• Where do charges occur?
• Data in and out
• Services used
• Integration experience is at a premium
• We need workers that can convert 

technical speak into business terms and 

make decisions
SACON 2020
Surprises in the cloud space
• Two major surprise providers:
• VMWare (Dell)
• Red Hat (IBM)
• Why?
• Visualization: Can manage 

multiple environments / providers
• Network management: Using SD-WAN to route IoT device traffic
• Abstraction layer: Helps avoid vendor lock-in
• Customer focus: History of creating useful services
• Emerging tech: Ability to integrate new solutions, including AI
and blockchain
SACON 2020
5G and emerging tech
• 5G – it’s finally here (mostly)
• Capturing data where it is generated
• Edge – microclouds, mini data centers
• Cloud
• More devices to support
• The good, the bad, and the ugly of 5G
Good
Connectivity
Speed
Edge
capability
Bad
Tampering
Eavesdropping
Monitoring
Attack surface
DDoS
Ugly
Privacy
Traffic QoS
Trust models
SACON 2020
AI / ML finds its place: automation
• AI is often used as a subset of 

automation
• The use of tech to automatically:
• Launch, under conditions
• Respond to situations
• Improve itself (and other “things”)
• Communicate with other

machines and other people
• But now, it’s all about the 

intelligence of things.
Automation
Artificial
Intelligence
Machine

Learning Deep
Learning
KubernetesDocker
SACON 2020
Common realities when implementing emerging tech
• Shadow IT / Bring Your Own IT
• Skipping steps in the software development 

or platform deployment cycle
• Not managing devices properly
• No encryption
• No or poor authentication
• Rapid deployment of new technologies 

workers don’t fully understand
• Organizations receiving data that they 

aren’t properly securing
SACON 2020
• Because companies have at least two different perspectives
• Information Technology (IT)
• Business leaders
Why does shadow IT exist?
IT says shadow
IT is:
BAD
Business says
shadow IT is:
GOOD
SACON 2020
The risks of shadow IT
Customer

dissatisfactio
n
Loss of
information
integrity
Non-
compliance
Cost
overrunsPerformanc
e issues
SACON 2020
The result?
• Upstream issues
• Privacy issues
• Penalties (e.g., GDPR, HIPAA)
• Loss of consumer confidence
• Attacks
• Ransomware, credential harvesting
• DDoS
• Social engineering
• Forms of “technical debt”
• Organizations often can’t fix 

problems that they 

have created by using IoT, Cloud, 

and other solutions
• Security workers are asked to fix this problem
Toxic IT?
Code
Complexity Monoculture
s
SACON 2020
An applied example
SACON 2020
So, who is responsible?
SACON 2020
• IT workers

need to

solve

these issues
• They have

the best

perspective
Complexity: The primary reason for increased sales cycles
SACON 2020
• The industry has

moved from mere

detection to issues 

involving:
• Privacy
• New ways of 

investigating

risk
• Selective attack

surface reduction



Critical areas within cybersecurity
SACON 2020
• Most companies

can state a clear business

case
• But, the details

remain a 

problem
• IT workers

are needed

to manage

these factors

ethically
Issue Where IT can help
Customer
Confusion
Clarify product capabilities (e.g., AI, BI). Find
creative solutions. Help make the customer
comfortable.
Risk
aversion
The technical and business risks. Act as liaison. Help
ensure privacy concerns are addressed.
Budget
constraints
Provide accurate information concerning cloud-
based services.
Inhibiting factors for using emerging tech
SACON 2020
• Learn your business!
• This isn’t a technical issue
• Focus on how information flows
in your organization
• Cloud-based assets
• Enterprise / installed
• It requires:
• The ability to breakdown IT silos
• Communication with business
units
• Ability to analyze multiple sources
• Formal documentation
• Network diagrams
Adopting a policy-driven approach to “surf” emtech
problems
Asset
discovery
Articulate
risk level
Identify
policy
Evaluate
compliance
to policy
Change
managemen
t policy
Continuou
s
monitoring
SACON 2020
• We need data / business

intelligence analysts
• Turn data into information
• Identify trends
• We also need security analysts
• Moving from detection 

to prevention
• Threat modeling
• Threat feed interpretation
• Cloud-aware pen testing
The need for analysts
• Can’t secure 100% of the 

company
• Focus on critical resources (the
25%)
SACON 2020
Threat hunters
▪ Profiling specific

attacks
▪ Can provide

characteristics

and context
▪ Situational

awareness
▪ Provides focus
▪ Can also use 

threat feeds
Learn how the
organization
communicates
Identify resources
essential to the
organization
Investigate attack techniques
hackers will try that specific to
your organization’s resources
Proactively investigate –
monitor and analyze
Recommend security controls
SACON 2020
• SolarWinds Service Desk
• SysAid
• ImmuniWeb Discovery
• SolarWinds Network |

Performance Monitor
• Qualys
• Many open source tools
Asset discovery applications
SACON 2020
The indispensable IT worker
▪ Having only tech skills isn’t

enough
▪ Workers need a combination of
human and tech skills
• Emotional
intelligence
• Presentation skills
• Complex reasoning
• Writing
• Categorizing and
summarizing
• Anticipating issues
• Complex
reasoning
• Conditional
thinking
• Multi-vendor
situations
• Integration
Ethics: An increasingly important ski
SACON 2020
Cloud Seeding: A
Cloud Computing
Tutorial (CompTIA)
The Skills needed to combat today’s cybersecurity

threats (RSA)
Automated Pen Testing

(Admin Magazine)
Two sides of the same coin: Pen testing and
security analytics


What’s hot in network certifications
(NetworkWorld)
Escaping the Cybersecurity Metrics Matrix
(CompTIA)
Private Eye: Open source tools for automated
pen testing Admin Magazine

Thoughts about the help desk
(YouTube)
The Hunt for the Meaning of the Red team
(CompTIA)
The Internet of
Things (IoT) and
Technical Debt: Why
It Matters
(CompTIA)
James Stanger, PhD
jstanger@comptia.org
+1 (360) 970-5357
Twitter: @jamesstanger
Skype: stangernet

My CompTIA hub:

https://certification.comptia.org/it-career-news/hub/James-Stanger
Thank You!
Latest articles and blog entries:
Putting AI and ML to work (CompTIA)
What is the difference between IT security and
cybersecurity? (CompTIA)
Observations at RSA San Francisco 2019
(CompTIA)
Moving to the
Cloud:IT
Infrastructure and
Cybersecurity skills
required (CompTIA)
Where the Wild
Things Are:
Investigating
Browser-based
Brute Force Attacks
(November, 2019,
Admin Magazine)
How Technical Debt
Can Damage
Business

Agility and

Competitiveness

(ITPro, UK)

Más contenido relacionado

La actualidad más candente

Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 

La actualidad más candente (20)

(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
 
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IoT Broker
IoT BrokerIoT Broker
IoT Broker
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
IoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT HubIoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT Hub
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 

Similar a (SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach

Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Eduardo Mendez Polo
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 

Similar a (SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach (20)

Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
 
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRampEliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
 
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom Approach
 
Cloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useCloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they use
 
Cloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT IndustryCloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT Industry
 
Applying Digital to Manufacturing Mindset
Applying Digital to Manufacturing MindsetApplying Digital to Manufacturing Mindset
Applying Digital to Manufacturing Mindset
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Big data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingBig data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computing
 
Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level Agreement
 
Blockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech LabBlockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech Lab
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictions
 

Más de Priyanka Aash

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach

  • 1. SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Surfing today’s emerging tech: A policy-based approach James Stanger, PhD CompTIA Chief Technology Evangelist @jamesstanger
  • 2. SACON 2020 Ambient computing – a wave that’s already here • Context-aware computing – “Presencing 2.0” • Intelligent tech monitors people (AI & ML) • Information you generate and use moves from: • Individuals to edge / cloud / data center • Environment to environment • Machine to machine • Part of the 4th industrial revolution • The result? • Hyper-personalization - customer focus • Data analytics and business intelligence • Control (?)
  • 3. SACON 2020 Emerging tech categories generating this wave through 2023 The above revenue drivers are also the building blocks of the ambient computing world
  • 4. SACON 2020 Data / information has become the critical skill area
  • 5. SACON 2020 Unprecedented connectivity of (smart) things • How is this data connected to 
 emerging tech? • How do we process this data into
 information? ICS DCS SCADA OT IoT Sensors / actuators / radios Gateway Data AcquisitionEdge AIData center Storage Application Network ServerML
  • 6. SACON 2020 IoT / OT and next steps: Customer experience (CX) • The next steps are to: • Transform “emerging tech” into
 customer-centric solutions • Make the architecture more efficient How do we apply AI
 and ML IoT? How do we turn this into a customer- focused solution? What about 
 serverless / edge?Should we do this?
  • 7. SACON 2020 Cloud – finally being used • After much talk, we’re seeing 
 actual adoption over the past 5 years • Another part of the “4th industrial 
 revolution” • Azure vs. Alibaba vs. AWS, and so forth:
 It depends on your business model • Where do charges occur? • Data in and out • Services used • Integration experience is at a premium • We need workers that can convert 
 technical speak into business terms and 
 make decisions
  • 8. SACON 2020 Surprises in the cloud space • Two major surprise providers: • VMWare (Dell) • Red Hat (IBM) • Why? • Visualization: Can manage 
 multiple environments / providers • Network management: Using SD-WAN to route IoT device traffic • Abstraction layer: Helps avoid vendor lock-in • Customer focus: History of creating useful services • Emerging tech: Ability to integrate new solutions, including AI and blockchain
  • 9. SACON 2020 5G and emerging tech • 5G – it’s finally here (mostly) • Capturing data where it is generated • Edge – microclouds, mini data centers • Cloud • More devices to support • The good, the bad, and the ugly of 5G Good Connectivity Speed Edge capability Bad Tampering Eavesdropping Monitoring Attack surface DDoS Ugly Privacy Traffic QoS Trust models
  • 10. SACON 2020 AI / ML finds its place: automation • AI is often used as a subset of 
 automation • The use of tech to automatically: • Launch, under conditions • Respond to situations • Improve itself (and other “things”) • Communicate with other
 machines and other people • But now, it’s all about the 
 intelligence of things. Automation Artificial Intelligence Machine
 Learning Deep Learning KubernetesDocker
  • 11. SACON 2020 Common realities when implementing emerging tech • Shadow IT / Bring Your Own IT • Skipping steps in the software development 
 or platform deployment cycle • Not managing devices properly • No encryption • No or poor authentication • Rapid deployment of new technologies 
 workers don’t fully understand • Organizations receiving data that they 
 aren’t properly securing
  • 12. SACON 2020 • Because companies have at least two different perspectives • Information Technology (IT) • Business leaders Why does shadow IT exist? IT says shadow IT is: BAD Business says shadow IT is: GOOD
  • 13. SACON 2020 The risks of shadow IT Customer
 dissatisfactio n Loss of information integrity Non- compliance Cost overrunsPerformanc e issues
  • 14. SACON 2020 The result? • Upstream issues • Privacy issues • Penalties (e.g., GDPR, HIPAA) • Loss of consumer confidence • Attacks • Ransomware, credential harvesting • DDoS • Social engineering • Forms of “technical debt” • Organizations often can’t fix 
 problems that they 
 have created by using IoT, Cloud, 
 and other solutions • Security workers are asked to fix this problem Toxic IT? Code Complexity Monoculture s
  • 16. SACON 2020 So, who is responsible?
  • 17. SACON 2020 • IT workers
 need to
 solve
 these issues • They have
 the best
 perspective Complexity: The primary reason for increased sales cycles
  • 18. SACON 2020 • The industry has
 moved from mere
 detection to issues 
 involving: • Privacy • New ways of 
 investigating
 risk • Selective attack
 surface reduction
 
 Critical areas within cybersecurity
  • 19. SACON 2020 • Most companies
 can state a clear business
 case • But, the details
 remain a 
 problem • IT workers
 are needed
 to manage
 these factors
 ethically Issue Where IT can help Customer Confusion Clarify product capabilities (e.g., AI, BI). Find creative solutions. Help make the customer comfortable. Risk aversion The technical and business risks. Act as liaison. Help ensure privacy concerns are addressed. Budget constraints Provide accurate information concerning cloud- based services. Inhibiting factors for using emerging tech
  • 20. SACON 2020 • Learn your business! • This isn’t a technical issue • Focus on how information flows in your organization • Cloud-based assets • Enterprise / installed • It requires: • The ability to breakdown IT silos • Communication with business units • Ability to analyze multiple sources • Formal documentation • Network diagrams Adopting a policy-driven approach to “surf” emtech problems Asset discovery Articulate risk level Identify policy Evaluate compliance to policy Change managemen t policy Continuou s monitoring
  • 21. SACON 2020 • We need data / business
 intelligence analysts • Turn data into information • Identify trends • We also need security analysts • Moving from detection 
 to prevention • Threat modeling • Threat feed interpretation • Cloud-aware pen testing The need for analysts • Can’t secure 100% of the 
 company • Focus on critical resources (the 25%)
  • 22. SACON 2020 Threat hunters ▪ Profiling specific
 attacks ▪ Can provide
 characteristics
 and context ▪ Situational
 awareness ▪ Provides focus ▪ Can also use 
 threat feeds Learn how the organization communicates Identify resources essential to the organization Investigate attack techniques hackers will try that specific to your organization’s resources Proactively investigate – monitor and analyze Recommend security controls
  • 23. SACON 2020 • SolarWinds Service Desk • SysAid • ImmuniWeb Discovery • SolarWinds Network |
 Performance Monitor • Qualys • Many open source tools Asset discovery applications
  • 24. SACON 2020 The indispensable IT worker ▪ Having only tech skills isn’t
 enough ▪ Workers need a combination of human and tech skills • Emotional intelligence • Presentation skills • Complex reasoning • Writing • Categorizing and summarizing • Anticipating issues • Complex reasoning • Conditional thinking • Multi-vendor situations • Integration Ethics: An increasingly important ski
  • 25. SACON 2020 Cloud Seeding: A Cloud Computing Tutorial (CompTIA) The Skills needed to combat today’s cybersecurity
 threats (RSA) Automated Pen Testing
 (Admin Magazine) Two sides of the same coin: Pen testing and security analytics 
 What’s hot in network certifications (NetworkWorld) Escaping the Cybersecurity Metrics Matrix (CompTIA) Private Eye: Open source tools for automated pen testing Admin Magazine
 Thoughts about the help desk (YouTube) The Hunt for the Meaning of the Red team (CompTIA) The Internet of Things (IoT) and Technical Debt: Why It Matters (CompTIA) James Stanger, PhD jstanger@comptia.org +1 (360) 970-5357 Twitter: @jamesstanger Skype: stangernet
 My CompTIA hub:
 https://certification.comptia.org/it-career-news/hub/James-Stanger Thank You! Latest articles and blog entries: Putting AI and ML to work (CompTIA) What is the difference between IT security and cybersecurity? (CompTIA) Observations at RSA San Francisco 2019 (CompTIA) Moving to the Cloud:IT Infrastructure and Cybersecurity skills required (CompTIA) Where the Wild Things Are: Investigating Browser-based Brute Force Attacks (November, 2019, Admin Magazine) How Technical Debt Can Damage Business
 Agility and
 Competitiveness
 (ITPro, UK)