Weitere ähnliche Inhalte Ähnlich wie 21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025! (20) Mehr von Dr David Probert (8) Kürzlich hochgeladen (20) 21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!1. 2121ststC CyberSecurity DefenceC CyberSecurity Defence
Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025
1
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Next 7 Years: 2018 to 2025Next 7 Years: 2018 to 2025
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
2. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
2
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
5. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” --
5
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
6. 6
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CyberSpaceCyberSpace & Virtual Reality& Virtual Reality:: Hollywood Style!Hollywood Style!
7. 7
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
“Cyber Reality!”“Cyber Reality!” : Global IPv4 Internet Servers:: Global IPv4 Internet Servers: 24/724/7
8. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): InIn--Depth ZoomDepth Zoom
8
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
9. “Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other Domain RegistriesOther Domain Registries
9
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
10. BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970
10
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
11. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
11
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
David ProbertDavid Probert
12. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
12
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
13. Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC
13
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
From:From: “Business Blueprint”:“Business Blueprint”: ProbertProbert –– July 1989July 1989
14. 2525thth Anniversary:Anniversary: “KolaNet”“KolaNet” -- Nuclear SecurityNuclear Security
14
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
KolaNetKolaNet Project:Project: 1992 to 19971992 to 1997 –– Kola PeninsulaKola Peninsula –– Russian ArcticRussian Arctic
15. Protecting Ukraine & Georgian ParliamentsProtecting Ukraine & Georgian Parliaments
-- Integrated Cyber and Physical SecurityIntegrated Cyber and Physical Security --
15
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Internet, Web Sites, & IT Security Programmes initiated 1994Internet, Web Sites, & IT Security Programmes initiated 1994
Ukraine ParliamentUkraine Parliament :: KyivKyiv Georgian Parliament:Georgian Parliament: TbilisiTbilisi
16. Cybersecurity forCybersecurity for Georgian Parliament:Georgian Parliament: 20072007 -- 20102010
16
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
...Critical Infrastructure Review & RoadMap:...Critical Infrastructure Review & RoadMap: UN/ITU CybersecurityUN/ITU Cybersecurity –– Georgian GovernmentGeorgian Government
17. Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia
17
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
LinkLink:: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
18. Cybersecurity &Cybersecurity & eGoveGov Missions:Missions: 20092009--20122012
**Mt AragatsMt Aragats –– South Summit(3879m):South Summit(3879m): ArmeniaArmenia**
18
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
19. 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 2 –TopTop 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 ––7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
19
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –– Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated”“Integrated”
55 ––Scenario 2020Scenario 2020:: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
77 –– CyberCyber Defence forDefence for CriticalCritical SectorsSectors 88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –YOURYOUR Action Plan for 21stC Cyber!...Action Plan for 21stC Cyber!...
20. ““CyberSecurityCyberSecurity @@ Board Level”Board Level”
•• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and
Governments to Plan & Invest @@ Board LevelBoard Level!
• CyberSecurity Tools are now in TransitionTransition from:
– 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls
–– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence
• Smart IoT Devices, Homes & Cities ALL require
20
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• Smart IoT Devices, Homes & Cities ALL require
Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks!
....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for
C$OC$O led Investment in Effective Cyber Defence!
21. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
21
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
22. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
22
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
23. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence:
1) Appoint Board Level CSOBoard Level CSO in Leadership Role!
2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
23
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists
5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap
6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
24. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 22 ––””TOPTOP 1010 Cyber Threats & Attacks!”Cyber Threats & Attacks!” 3 – 7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
24
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
25. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
25
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
26. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
26
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
27. Thrust SSCThrust SSC –– “Breaking the Sound Barrier”“Breaking the Sound Barrier” **
Mach ONEMach ONE -- 1228km/h1228km/h –– October 1997 *October 1997 *
27
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
28. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
28
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
29. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
29
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
30. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
Red Alert!Red Alert!
30
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
31. Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
31
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
32. Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
32
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
33. Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
33
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
34. Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
34
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
35. Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
35
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
36. Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017
Recommended!Recommended!
36
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf
Recommended!Recommended!
37. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
37
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
38. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
38
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
39. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
39
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
40. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
40
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
41. Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack!
41
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
42. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
42
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
43. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 33 ––77 YearYear CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
43
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
44 ––Scenario 2018:Scenario 2018: CyberCyber & Physical Tools& Physical Tools
“Integrated”“Integrated”
55 ––Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
44. 7 Year7 Year CyberVision:CyberVision: “The New Toolkit”“The New Toolkit”
• During the last 7 Years CyberThreatsCyberThreats targeted:
–– Critical National Infrastructure (CNI):Critical National Infrastructure (CNI): Energy, Banks,
Transport, Government, Healthcare, Education...
–– Major Events:Major Events: Sports, Elections & Culture Festivals...
–– CriminalCriminal eCommerceeCommerce: “The Dark Web” & “SilkRoad”!
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
44
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
Defence against “Zero“Zero--Day”Day” & “Insider”“Insider” Attacks!
• Exponential Increase in Device Connections (IoT)
requires Cyber DefenceCyber Defence through AI/MLAI/ML “Bots”“Bots”
running 24/7 on ALL Networked System Assets!
45. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
45
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
46. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
46
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
47. CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence”
•• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools
within Organised Crime SyndicatesOrganised Crime Syndicates!
•• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” &
exploited with ease by “BotNets”!“BotNets”!
•• CyberDefenceCyberDefence for Business & Government requires
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
47
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
Defence”Defence” and “Augmented Reality”Augmented Reality”!
...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for:
20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent)
48. CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence”
•• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools
within Organised Crime SyndicatesOrganised Crime Syndicates!
•• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” &
exploited with ease by “BotNets”!“BotNets”!
•• CyberDefenceCyberDefence for Business & Government requires
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
48
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Managed 7 Year Transition to “Speed of Light” ““Speed of Light” “NeuralNeural
Defence”Defence” and “Augmented Reality”Augmented Reality”!
...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for:
20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) && 20252025 (Intelligent)(Intelligent)
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
49. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
49
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
50. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
50
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
51. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
51
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202551
44 ––Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticalCritical SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
52. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
52
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
53. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
53
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
54. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
54
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
55. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
55
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 2025202555
4 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
55 ––ScenarioScenario 2020:2020: Internet of Things: IoTInternet of Things: IoT
““Adaptive”Adaptive”
6 –Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
56. Scenario 2020Scenario 2020: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Adaptive Security****** Adaptive Security***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
56
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
57. Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors
57
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
58. “IoT Devices”:“IoT Devices”: Wristbands and WatchesWristbands and Watches
58
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
59. “IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM
59
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
60. Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures
60
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
61. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
61
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
62. 20182018--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
62
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
63. 63
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
64. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
64
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
65. IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture
65
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
66. EU/IERCEU/IERC –– Research Cluster Reports onResearch Cluster Reports on
““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things
66
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
67. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
67
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
66 –– Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CyberCyber Defence forDefence for CriticaCriticall SectorsSectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
68. ScenarioScenario 2025+2025+:: “Augmented Reality”“Augmented Reality”
*** Intelligent Security ****** Intelligent Security ***
• Major Trends and Developments: Scenario 2025Scenario 2025
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
68
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
69. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
69
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
70. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
70
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
71. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
71
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
72. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
72
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
73. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
73
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
74. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
74
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
75. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
75
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
76. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
76
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
77. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
77
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
78. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
78
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
79. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
79
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
www.deepinstinct.comwww.deepinstinct.com
** APTAPT = Advanced Persistent Threat *= Advanced Persistent Threat *
80. Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
80
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
www.nvidia.comwww.nvidia.com/content/dam/en/content/dam/en--zz/Solutions/deepzz/Solutions/deep--learning/home/learning/home/DeepLearning_eBook_FINAL.pdfDeepLearning_eBook_FINAL.pdf
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
81. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
81
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
82. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
82
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
83. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
83
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
84. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
84
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
85. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
85
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
86. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
86
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
87. InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds””
•• Neural AI/MLNeural AI/ML CyberSecurityCyberSecurity Solutions will require
enhanced Intelligent Human/Machine Interfaces!
• Human Communications run @ Sound Speed....@ Sound Speed.... whilst
Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!..
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
87
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
Software(SW) will “Bridge” Human & Cyber Worlds!
....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces
for Security Management during the next 7 Years!....7 Years!....
88. Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling
88
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
89. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
89
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 202520252121ststC CyberC Cyber Defence:Defence: 20182018 -- 20252025
90. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
90
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
91. Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
91
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Algorithmic Computer Trading usingAlgorithmic Computer Trading using RealReal--Time Neural NetsTime Neural Nets
& Statistical Maths Tools have been used for& Statistical Maths Tools have been used for 25+25+ Years!Years!
.....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent
realreal--time forecasts for enterprisetime forecasts for enterprise cybersecuritycybersecurity threats!threats!
92. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
92
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
93. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
93
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
94. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
94
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
95. ScenarioScenario 2040+2040+: Cyber: Cyber DefenseDefense––NATO & CanadaNATO & Canada
95
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
96. ScenarioScenario 2040+2040+: Cyber Defence: Cyber Defence
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
96
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
97. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
97
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
44 –– Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
77 –– CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
98. Critical Sectors:Critical Sectors: Cyber Threat ScenariosCyber Threat Scenarios
•• Hybrid CyberHybrid Cyber--Physical Security ThreatsPhysical Security Threats willwill targettarget ALLALL
ofof YOURYOUR Critical Business and Government Sectors!....Critical Business and Government Sectors!....
a)a) Finance & BankingFinance & Banking – ATMs, Fraud, Money Laundering
b)b) Transport & TourismTransport & Tourism – Airports, Metro, Tourist Sights
c)c) Energy & UtilitiesEnergy & Utilities – Nuclear, Chemical & Water Resources
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
98
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
e)e) Education & ResearchEducation & Research – Campus-Wide Armed Attacks
f)f) Industry & ManufacturingIndustry & Manufacturing – Competitive Espionage
g)g) Retail, Sports & CultureRetail, Sports & Culture – Malls, Concerts, Olympics.....
........CSOsCSOs are advised toare advised to URGENTLYURGENTLY define practicaldefine practical
& effective action plans to mitigate such attacks!...& effective action plans to mitigate such attacks!...
99. CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things”
Sensor Networks
99
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
100. Critical Sector Case Study:Critical Sector Case Study: Banks & FinanceBanks & Finance
•• Banks & FinancialBanks & Financial Institutions are prime targets for cybercriminals.
•• AccessAccess to Accounts is usually indirect through phishing scams, infected
websites with malicious scripts, and personal ID Theft.
•• OnOn--Line bank transfersLine bank transfers are also commonly used for international money
laundering of funds secured from illegal criminal and political activities
•• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the classic
“Advanced Fee Scam” as well as Lottery and Auction Scams
•• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing
100
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• CyberCyber--ExtortionExtortion && RansomwareRansomware are now epidemic via web & email phishing
•• National & Commercial BanNational & Commercial Banksks have also been regular targets of DDOS
Cyberattacks from politically motivated and terrorist organisations
•• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will receive
penetration scans and Cyberhacks both “direct” & with “Bots” & Trojans
•• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal Banking
are at the “sharp end” of financial security and require significant efforts
towards end-user authentication & transaction network security
...”Intelligent Security”...”Intelligent Security” is now mandatory foris now mandatory for ALLALL Financial Institutions!Financial Institutions!
100
101. Critical Sector Case Study:Critical Sector Case Study: GovernmentsGovernments
•• Cyber Agencies:Cyber Agencies: Over 70 National Governments (from 193 UN/ITU
Member States) have now Cybersecurity Agencies & Programmes
•• eGovernmenteGovernment ServicesServices are critically dependant upon strong cybersecurity
with authentication for the protection of applications, and citizen data
•• Compliance Audit:Compliance Audit: All Government Ministries & Public Agencies should
receive in-depth ICT security audits and full annual compliance reviews
1) National Defence Forces
2) Parliamentary Resources
3) Land Registry & Planning System
101
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Land Registry & Planning System
4) Citizen IDs and Passports
5) Laws, Legislations, and Policies
6) Civilian Police, Prisons & National e-Crimes Unit (NCU)
7) National CERT – Computer Emergency Response Team
8) Inter-Government Communications Network
9) eServices for Regional & International Partnerships
10) Establishment of cybersecurity standards & compliance
11) Government Security Training and Certification
101
102. “Smart Security” for Critical Sectors:“Smart Security” for Critical Sectors:
YOURYOUR Shopping and To Do List!Shopping and To Do List!
• Security Audit: In-Depth Security Audit and Action Report - Spanning BOTH
Physical and Cybersecurity Operations, Assets and Technologies
• International Standards: Understand and Implement Security Policies and
Programmes to International Standards – ISO/IEC, UN/ITU, IEEE, NIST, ASIS, ISF
• Training: Professional Training: Form strategic partnerships with leading
educational & research institutions to develop pipeline of professional
graduations in cybersecurity & integrated security technologies
102
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
graduations in cybersecurity & integrated security technologies
• CERT/CSIRTs: Understand the critical role of Cybersecurity CERTs and link their
alerts and operational processes within your overall security policies
• Security Associations: Join Security Associations and follow developments in
Cybersecurity for ““Intelligent RealIntelligent Real--Time Systems”Time Systems” & “Internet of Things”“Internet of Things”
........YOURYOUR Top Priority is ProfessionalTop Priority is Professional Cybersecurity Training & CertificationCybersecurity Training & Certification withwith
regular courseregular course “Top“Top--Ups”Ups” since the field is moving atsince the field is moving at Supersonic SpeedSupersonic Speed!!
103. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & AttacksCyber Threats & Attacks!! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools 5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
103
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 – Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – CybeCyberr Defence forDefence for CriticalCritical SectorsSectors 88 –– CyberCyber VISIONVISION to Securityto Security NOWNOW!! 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
104. “From“From 77 YearYear CyberVisionCyberVision toto RealityReality!”!”
• 7 Year Evolution of Business “$“$ecurityecurity Culture”Culture”
•• Cyber RoadMapCyber RoadMap managed by Board-Level C$O
• Integrated Security with Intelligent AI Alerts!Intelligent AI Alerts!
• Professional Cyber TrainingCyber Training for EVERY Business
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
104
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
•• Trial and DeployTrial and Deploy Adaptive AI Security Solutions
.....CyberSecurityCyberSecurity now requires $$$$$$ Investment in
Teams & Technology to Mitigate Major Risks!...Mitigate Major Risks!...
105. UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021
DefendDefend –– DeterDeter -- DevelopDevelop
105
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor
Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016
DefendDefend –– DeterDeter -- DevelopDevelop
106. ““YOURYOUR OperationalOperational Cyber DefenceCyber Defence””
•• CC$$O:O: Board Level Role – Chief $ecurity Officer - with
Security Investment Plan and $$$ Budget!..
•• Cyber Standards:Cyber Standards: Migrate to International Security
Standards such as ISO2700x Series
•• Compliance:Compliance: Implement regular IT Asset & Process
Audits to ensure Full Compliance
•• Training:Training: Ensure Key Staff are Professionally Certified
106
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
•• Training:Training: Ensure Key Staff are Professionally Certified
(CISSP) with Bi-Annual Updates.
•• Culture:Culture: Launch Business/Agency Security Policy so ALLALL
Staff understand their Responsibilities!
....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR
BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
107. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
107
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
108. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
108
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
109. NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
109
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
110. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –TOPTOP 1010 Cyber Threats & Attacks!Cyber Threats & Attacks! 3 –7 Year7 Year CyberVision: The New ToolkitCyberVision: The New Toolkit
4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools 5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT 6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
2121ststCC CyberSecurity Defence:CyberSecurity Defence: 20182018––20252025
110
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
4 – Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated”“Integrated”
5 -Scenario 2020:Scenario 2020: Internet of Things: IoTInternet of Things: IoT
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: AI & Machine LearningAI & Machine Learning
“Neural Security”“Neural Security”
7 – CyberCyber Defence forDefence for CriticaCritical Sectorsl Sectors 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! 99 –– YOURYOUR Action Plan for 21Action Plan for 21ststCC Cyber!...Cyber!...
111. ““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan””
• Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a
Campaign Action Plan for Active Cyber Defence!
• Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires:
––C$O:C$O: Board Level Security Plan and $ Investment
111
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
––C$O:C$O: Board Level Security Plan and $ Investment
––Technical:Technical: Professional Team, Tools & Training
––Operational:Operational: Security, Standards & Compliance
........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up
withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
112. YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!...
• Every CSO needs Board-Level Approval for Annual
Security Business Plan that includes CyberSecurity
• YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include:
–– Investment BudgetInvestment Budget for Integrated Security Solutions
–– Job SpecificationsJob Specifications for Professional “Cyber” Team
112
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Job SpecificationsJob Specifications for Professional “Cyber” Team
–– Security Staff TrainingSecurity Staff Training & Professional Development
–– Technical & OperationalTechnical & Operational Plans & Upgrades
–– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards
.....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
113. YOUR TOP 10YOUR TOP 10 CyberSecurity Actions!CyberSecurity Actions!
1) CSO – Chief Security Officer’s Team –
Board Level Roles & Responsibilities
2) Professional Training – Suggest Top-
Level CISSP Certification for Team
6) ICT: Hire Qualified Cyber Systems
Technology, Software & Operations Team
7) Review Security Risks & Connectivity of ALL
Enterprise IP Legacy Assets & Devices (IoT)
8) Design Practical Multi-Year Roadmap for
113
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
3) Implement International Security
Standards (ISO/IEC- 27000)
4) Develop Professional CERT Team
5) Profile YOUR Security Staff and
Contractors for Possible Risks
8) Design Practical Multi-Year Roadmap for
Cyber-Physical Security Integration
9) Professional Association Membership for
Team Networking & Skill Building
10) Cyber Legal Protection – Check Your
Contracts for Cyber Trading Risks
114. “Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders”
AI & Machine LearningAI & Machine Learning
CyberSecurity Tools willCyberSecurity Tools will
114
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
CyberSecurity Tools willCyberSecurity Tools will
ProvideProvide “Speed of Light”“Speed of Light”
RealReal--Time Defence againstTime Defence against
TOP 10TOP 10 Threats & Attacks!Threats & Attacks!
“Steam Powered Birds arrive over our Cities! - 1981
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
115. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
115
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
118. AdditionalAdditional CybersecurityCybersecurity ResourcesResources
118
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
LinksLinks:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs && www.slideshare.net/DrDavidProbertwww.slideshare.net/DrDavidProbert
119. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
119
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
120. 2121ststC CyberSecurity Defence:C CyberSecurity Defence: 20182018––2025!2025!
120
-- 2121ststC CyberSecurity DefenceC CyberSecurity Defence --
“The Next 7 Years: 2018“The Next 7 Years: 2018 –– 2025”2025”
*** London, UK – September 2017 ***
© Dr David E. Probert : www.VAZA.com ©
2121ststC Cyber Defence:C Cyber Defence: 20182018 -- 20252025