SlideShare una empresa de Scribd logo
1 de 69
.
McAfee Confidential
.
Jarno Limnéll | Director of Cyber Security
Professor of Cyber Security in Aalto University
Doctor of Military Science
Twitter: @JarnoLim
Cyber Conflicts –
Time for Reality Check
“We are about three warm meals
away from anarchy/revolution?”
Security FEELING
RESILIENCEREALITY
FEELING:
HOW (SECURE) DO WE FEEL?
REALITY:
HOW THINGS REALLY ARE?
SECURITY ENVIRONMENT –
PHYSICAL AND DIGITAL
– IS MORE UNCERTAIN, DYNAMIC AND
MORE DEMANDING THAN EVER
RESILIENCE:
HOW WE WITHSTAND PHYSICALLY AND MENTALLY
INSECURITY – HOW DO WE VALUE OUR SECURITY?
Complete security is a myth,
Known – Unknown threats
Instead of (only) building walls,
”Defense in depth”
Ability to change
and resilience
create security.
Not constancy.
Security under the Cyber Dome
The Digital world is effecting everywhere
Everybody and
everything is
becoming
CONNECTED
Dependence
14
THE DIGITAL WORLD OF BITS
DIGITAL AND PHYSICAL BLUR
Returningbackto “typewritersage”?
No. But securityistaken(hopefully)more serious.
The digital world is everywhere.
So must be Security.
Like whisked egg in the cake.
There is no issue so important in security –
which remains so poorly understood…
Cybersecurity is primarily a strategic issue
GUIDANCE
The importance of combining technological
and strategic thinking
-
both are needed in order to have
comprehensive approach to cybersecurity,
its threats and solutions
Cyber conflict?
“Cyberwar” should be used carefully…
…not separated from the context of War
Cyber is already and will be an element of all cris
we’re going to see in the future
"Every age has its
own kind of war,
its own limiting
conditions
and its own peculiar
preconceptions.”
Carl von Clausewitz
Continuation of politics
by other means,
incl. cyber means in
”policy toolbox”
IN THE SHADOWS,
3 levels of cyber activities
Lower level cyber activities
Digital information “war”
Strategic cyber attacks
US Department of Defense’s
3 types of Cyber threats:
27
Lack of precedents,
Cyber playbook is pretty
empty (at the moment)
THE FIFTH DOMAIN
or penetrating all levels and dimensions?
LAND SEA
SPACEAIR
CYBER
Cyber needs to be considered as part of
broader military strategy
Strategic challenges
How integrate Cyber to other military
operations and broader concept?
Outsourcing Cyber attacks – how
to respond?
The problem of attribution – who
is your enemy?
NATO – Cyber – Article 5
Threat,
Resources
1. Cyberattacks, cyber-espionage
2. Counterintelligence
3. Terrorism
4. WMD Profiliferation
5. Counterspace
DefenseNews Leadership Poll,
January 2014
Threat evaluation
WHO (actor/condition) produces the threat?
WHY (motivation)?
How serious is the IMPACT?
Cyber arms
race
Accelerating
NOT ONLY NATION-STATES
There are 20 to 30 cybercrime groups that have
nation-state level capacity
“You are the cyber-war
agents and get yourself
ready for such war
wholeheartedly.”
Iran's Supreme Leader Ayatollah Ali Khamenei
“Cyber will soon be
revealed to be the biggest
revolution in warfare,
more than gunpowder and
the utilization of air power
in the last century.”Major General Aviv Kochavi, IDF
“We don't need more tanks,
we need the latest in cyber
warfare.”
UK Prime Minister David Cameron
“U.S. Cyber Command will
number more than 6,000
people by 2016, making it
one of the largest such -
forces in the world.”US Secretary of Defense Chuck Hagel
The world is moving towards a
greater strategic use of cyber
to persuade adversaries to
change their behavior.
Capability and will.
What restraints the use of strategic cyber
capabilities?
Unpredictable side-effects
Do not expose capabilities
Possible escalation
Resources are needed, but in cyber big brains are
more important than big brawn…
5 Strategic Trends
to Follow
1
The Role of
Cyber Espionage
WHO’S SPYING ON WHOM?
Does intelligence
collection or cyber
reconnaissance become
an act of war?
2
Measuring
Cyber
Capabilities
Level of Cyber
capabilities?
SUSPICION
Digital dependence - Defensive
Informational - Intelligence
Offensive capabilities
Resilience (physical, mental)
R&D and innovation capabilities
Doctrine, Policy
A country’s cyber military strength
can be judged by six capabilities:
3
Grey area
Beginning – End
Our side – Their side
Military – Civilian
Involved – Not-involved
Win – Lose
Violence – Non-violence
Hardware – Software
4
Cyber
Deterrence
ELEMENTS OF
CYBER
DETERRENCE
RESILIENCE
ATTRIBUTION
OFFENSE
Countries will expose
offensive cyber capabilities
more openly – because of
deterrence
5
Cyber Peace
THE TREND IS OFFENSIVE
The main question is not how to get rid of it
but how to live with it!
The most
important
question in
(cyber)
security?
TRUST
On the road to distrust?
1990 1995 2000 2005 2010 2015 2020
Internet
becomes a mass
phenomenon
WEB 2.0
is born
JOURNEY FROM THE WORLD OF ATOMS TO THE WORLD OF BITS
We are here
We choose
either
LEADERSHIP or
CRISIS…
2014
The zone of
distrust
The zone of trust
Familiar, accepted norms
Old norms are adjusted
to cope with the “brave
new world”
The need for new
norms and ways of
thinking
Are we the last generation to take
joy from the global Internet?
The internet has changed the
way we change our world
Security - Privacy
CYBER SECURITY IS BECOMING MORE PERSONAL
67
It is a right to get work email on
a personally owned device
What is already out there?
THANK YOU!
jarno_limnell@mcafee.com

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Defense in an Changing Cyberspace
Cyber Defense in an Changing Cyberspace Cyber Defense in an Changing Cyberspace
Cyber Defense in an Changing Cyberspace
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 

Similar a Cyber Conflicts - Time for Reality Check

Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
Ronald E. Laub Jr
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
MSR Buzz
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
jessicafay2010
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
TopCyberNewsMAGAZINE
 

Similar a Cyber Conflicts - Time for Reality Check (20)

Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Cyber Conflicts - Time for Reality Check

Notas del editor

  1. Alempi teksti näkyviin vasta klikkauksella.