SlideShare a Scribd company logo
1 of 134
Download to read offline
•
Security Futures:Security Futures: 20182018--20252025++
TTechnology,echnology, TToolsools && TTrendsrends
1
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
TTechnology,echnology, TToolsools && TTrendsrends
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--SonsSons -- Ethan, Matthew, Roscoe & HughEthan, Matthew, Roscoe & Hugh -- Securing YOUR Future!Securing YOUR Future!
•
Фьючерсы на БезопасностьФьючерсы на Безопасность:: 20182018--2025+2025+
2
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ТТехнологии,ехнологии, ИИнструменты инструменты и ТТенденцииенденции
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
CyberCyber Futures & Defence:Futures & Defence: “Dual Themes”“Dual Themes”
Theme (1)”Theme (1)” -- “Security Futures:“Security Futures: 20182018--2025+2025+” :” : TTechnology,echnology, TTools andools and TTrends...rends...
-- Bringing CyberSecurity toBringing CyberSecurity to YOURYOUR Board Room with Budget & Mission!Board Room with Budget & Mission!
-- FutureFuture CyberCyber--ScenariosScenarios for Integrated, Adaptive, Intelligent Security!for Integrated, Adaptive, Intelligent Security!
-- New CyberSecurity Toolkits to DefendNew CyberSecurity Toolkits to Defend YOURYOUR Business Operations!Business Operations!
““ CyberVision: Machine Learning, AI & Neural Security“CyberVision: Machine Learning, AI & Neural Security“ 2121stst Nov: 09:40Nov: 09:40–– 10:2010:20
6
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ThemeTheme (2)(2) –– “Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent CyberSecurity for OUR 21Intelligent CyberSecurity for OUR 21stst C...C...
-- TOP 10 CyberThreatsTOP 10 CyberThreats: Exploration, Penetration and Attack!: Exploration, Penetration and Attack!
-- RecentRecent Case StudiesCase Studies of Cyber Crime, Terror & Political Attacks!of Cyber Crime, Terror & Political Attacks!
-- DevelopingDeveloping YOURYOUR Action Plans & Cybersecurity Programme!Action Plans & Cybersecurity Programme!
““CyberDefenceCyberDefence: Real: Real--Time Learning, Detection & Alerts”Time Learning, Detection & Alerts” 2121stst Nov: 14:30Nov: 14:30 –– 15:1015:10
Download SlideDownload Slides:s: www.valentina.net/Seville2017/www.valentina.net/Seville2017/
Topics suggestedTopics suggested @@ GenoaGenoa –– June 2017June 2017
1.1. Biometrics in the 21Biometrics in the 21stst Century forCentury for Global SecurityGlobal Security
2.2. IT Security Trends:IT Security Trends: Key Business & Security DriversKey Business & Security Drivers
3.3. Managing Information Risk :Managing Information Risk : Solutions for SurvivalSolutions for Survival
4.4. Modern Technical Security Tools for ProtectionModern Technical Security Tools for Protection
5.5. Technical Innovations inTechnical Innovations in Access Control SecurityAccess Control Security
7
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
5.5. Technical Innovations inTechnical Innovations in Access Control SecurityAccess Control Security
6.6. Managing Enterprise Security in Changed WorldManaging Enterprise Security in Changed World
7.7. Effective IT Security:Effective IT Security: Prevent & Adapt to ThreatsPrevent & Adapt to Threats
......We’ll respond to......We’ll respond to ALLALL these during this talk onthese during this talk on
“Security Futures”:“Security Futures”: TTechnology, Tools &echnology, Tools & TTrendsrends
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level””
“YOUR Cyber Mission“YOUR Cyber Mission””
22 ––CyberCyberCrime:Crime:CyberTCyberTerror:error:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
(1)(1)--SecuritySecurity 20182018--20252025:: YOURYOUR CyberCyber MissionMission
8
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“YOUR Cyber Mission“YOUR Cyber Mission”” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
“Neural Security”“Neural Security”
88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“New Cyber Toolkit”“New Cyber Toolkit”
9 –YOURYOUR Action Plan for 21stC Cyber!..Action Plan for 21stC Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level””
“YOUR Cyber Mission“YOUR Cyber Mission””
22 ––CyberCyberCrime:Crime:CyberTCyberTerror:error:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
(1)(1)--SecuritySecurity 20182018--20252025:: YOURYOUR CyberCyber MissionMission
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level””
9
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“YOUR Cyber Mission“YOUR Cyber Mission”” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
“Neural Security”“Neural Security”
88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“New Cyber Toolkit”“New Cyber Toolkit”
9 –YOURYOUR Action Plan for 21stC Cyber!..Action Plan for 21stC Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level””
“YOUR Cyber Mission”“YOUR Cyber Mission”
““CyberSecurityCyberSecurity @@ Board Level”Board Level”
•• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and
Governments to Plan & Invest @@ Board LevelBoard Level!
• CyberSecurity Tools are now in TransitionTransition from:
– 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls
–– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence
• Smart IoT Devices, Homes & Cities ALL require
10
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• Smart IoT Devices, Homes & Cities ALL require
Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks!
....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for
C$OC$O led Investment in Effective Cyber Defence!
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
11
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
12
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence:
1) Appoint Board Level CSOBoard Level CSO in Leadership Role!
2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
13
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists
5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap
6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar
““OUR CyberOUR Cyber Society”Society”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
(2)(2)--SecuritySecurity 20182018--20252025:: OUROUR CyberCyber SocietySociety
14
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar
““OUR CyberOUR Cyber Society”Society”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
(2)(2)--SecuritySecurity 20182018--20252025:: OUROUR CyberCyber SocietySociety
22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar
““OUR CyberOUR Cyber Society”Society”
15
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
“CyberSecurity Plan”“CyberSecurity Plan”
““OUR CyberOUR Cyber Society”Society”
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
16
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
Thrust SSC:Thrust SSC: 11stst Supersonic CarSupersonic Car -- 1515thth Oct 1997Oct 1997
17
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Thrust SSC:Thrust SSC: World Speed Record: 1997World Speed Record: 1997--20172017
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
BloodHoundBloodHound SSC 2017SSC 2017
18
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
1997 Thrust SSC1997 Thrust SSC
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
19
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
20
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
“Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018!
-- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! --
• 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts)
• 1948 – “Cybernetics” – Norbert Wiener
• 1969 – ARPANet Launched – 4 Packet Switching Net Nodes -
• 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn
• 1982 – Elk Cloner - 1st “Apple Computer Virus
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
21
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
• 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp)
• 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee
• 1993 – Mosaic Browser – NCSA – Illinois, USA
• 2018 –Transition to AI/ML Apps for 21stC CyberSecurity!
-- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+
•• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged
“Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO”
•• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed
“Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things”
22
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to
“Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools
•• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity
based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber“OUR Cyber Society”Society”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
23
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber“OUR Cyber Society”Society”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security“Integrated Security””
24
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
“Integrated Security“Integrated Security””
Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
25
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
26
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
“Real“Real--Time”Time” CCTVCCTV City SurveillanceCity Surveillance
27
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance
28
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools
IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
Metro Surveillance:Metro Surveillance: Charing Cross, LondonCharing Cross, London
29
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
RealReal--TimeTime Surveillance:Surveillance: TransportationTransportation
30
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling
forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management”
31
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
32
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack
•• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce
YOUR Risks of Cyber Threats & Attacks...
–– Device & Access AuthenticationDevice & Access Authentication by Fingerprints,
Retinal/Iris Scan or Palm Vein Scan
–– Facility AccessFacility Access with “Live” 3D Facial Recognition
–– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
33
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
–– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
CCTV & Real-Time Self-Learning Video Analytics
–– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials –
(CChemical, BBiological, RRadiological, NNuclear)
...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated
with the CSO-led Business Security OperationsBusiness Security Operations
TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions
34
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions
35
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics
36
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans
37
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberCyber Digital Forensics:Digital Forensics: PostPost--AttackAttack
• Evidence from Cyber Digital Forensics can help to
identify the Criminals, Terrorists and Cyber Attackers:
•• Physical Forensics:Physical Forensics:
– Blood & Tissue Samples
– DNA & Genetic Analysis
– Chemical Agents, GSR, Fibres
•• Cyber Forensics:Cyber Forensics:
38
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Cyber Forensics:Cyber Forensics:
– Cyber Attack IP Address/DNS/Proxies
– Malware/Trojan/Virus Analysis
– Botnet/DDOS , Targets & Payload
– RansomWare/Encryption & Attack “Signatures”
...Evidence from BOTH Cyber & Physical ForensicsCyber & Physical Forensics
will be relevant to 21stC Terror Threats & Attacks!...
Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”!
39
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930
“Forensics Pioneer”“Forensics Pioneer”
a)a) Detective WorkDetective Work
b)b) FingerprintsFingerprints
c)c) Ciphers & CodesCiphers & Codes
d)d) FootprintsFootprints
e)e) HandwritingHandwriting
Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore
40
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberCyber--Bio:Bio: Security Threat ScenariosSecurity Threat Scenarios
•• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats
•• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft
•• Defence/Military:Defence/Military: Cyber-Espionage & Attacks
•• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs
•• Culture/Sports:Culture/Sports: Major Events & Competitions
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
41
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
•• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege
•• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records”
...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL
Business Sectors & Critical Infrastructure!
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
42
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference42
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
43
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference43
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
“Self“Self--Adaptive Security”Adaptive Security”
Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Adaptive Security****** Adaptive Security***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
44
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
20192019 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
45
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM
46
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
47
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
48
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture
49
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
EU/IERCEU/IERC –– Research Cluster Reports:Research Cluster Reports:
““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things
50
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
51
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
52
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
Market Capitalisation ofMarket Capitalisation of 1000+1000+ CryptoCurrenciesCryptoCurrencies::
****** $200 Billion+$200 Billion+ ******
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
53
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
2 –CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
54
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference54
“YOUR Cyber Mission”“YOUR Cyber Mission” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
2 –CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
55
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference55
“YOUR Cyber Mission”“YOUR Cyber Mission” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!...
“CyberSecurity Plan”“CyberSecurity Plan”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning Security”Learning Security”
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
56
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
mitigate risks of new malware that have no prior “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
“Surfing the Evolutionary“Surfing the Evolutionary Cyber Waves”Cyber Waves”
-- More than 45 Years45 Years of AI & CyberSecurityAI & CyberSecurity! -
• 1970 – BT Research Labs – IBM 360 –Digital PCM
• 1976 – AI Thesis – Stochastic Learning Automata
• 1982 – AI & Expert Systems: UK Govt Programme
• 1991 – EARN/TERENA: European Networks Board
• 1992 – International Net Conference: RAS, Moscow
• 1994 – EMEA – Internet, Security & eCommerce
57
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• 1994 – EMEA – Internet, Security & eCommerce
• 2007 – Georgian Parliament Security Projects
• 2009 – Armenia eGovernance & CyberSecurity
• 2010 – Georgian Cybersecurity Audit & Roadmap
......Global Marketplace for......Global Marketplace for ”Cyber” AI/ML Apps”Cyber” AI/ML Apps willwill
mainstream during themainstream during the Next 7 Years: 2018Next 7 Years: 2018 –– 20152015 !!
BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970
58
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
59
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
David ProbertDavid Probert
Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
60
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000”
-- 2001:2001: A Space OdysseyA Space Odyssey (1968)(1968) --
61
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000”
-- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) --
62
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools”
*** Self*** Self--Learning Security ***Learning Security ***
• Major Trends and Developments: Scenario 2025Scenario 2025
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
63
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
64
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
65
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
66
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm
67
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
68
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
69
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
70
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning
DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure
71
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning
DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure
72
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning
DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure
73
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
2 –CyberCyberCrime:Crime:CyberCyberTerror:CTerror:CyberyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
74
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
2 –CyberCyberCrime:Crime:CyberCyberTerror:CTerror:CyberyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent Security”Intelligent Security”
75
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
“Cyber“Cyber--Intelligent Security”Intelligent Security”
ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security”
• Transition & Full Deployment of Enterprise-Wide
AI/ML-based IntelligentIntelligent “CyberSecurity” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of
Net Traffic, System/Event Logs, Net Nodes, Servers,
Databases, Devices & Users
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
76
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
augment Classic Detection using “Known Bad”,“Known Bad”, and
hence provide New Generation “Defence In“Defence In--Depth”Depth”
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both Traditional &
Advanced AI/ML “Cybersecurity Tools”
HybridHybrid 2121ststC Business OrganisationC Business Organisation
-- Hierarchical & NetworkedHierarchical & Networked --
•• TransitionTransition from 20thC to 21stC Business, Governance & Security
requires fundamental re-structuring of operations:
–– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies -
”Pyramids””Pyramids” - to manually process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
77
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
•• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of
their extended nervous system (Brain & BodyBrain & Body) to optimise real-time
learning and effective self-organising environmental adaptation!
•• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to
optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
78
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
** WorldWideWorldWide AIAI MarketPlaceMarketPlace **
(1) Investments & Acquisitions:(1) Investments & Acquisitions: 20122012 -- 20172017
79
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Source:Source: “Big“Big--Tech in AI”Tech in AI” -- CBCBInsightsInsights
** WorldWideWorldWide AIAI MarketPlaceMarketPlace **
(2) Investments & Acquisitions:(2) Investments & Acquisitions: 20122012 -- 20172017
80
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Source:Source: “Big“Big--Tech in AI”Tech in AI” -- CBCBInsightsInsights
81
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
82
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
83
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
84
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
85
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
86
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
87
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
88
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
89
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
90
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
91
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
92
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
www.deepinstinct.comwww.deepinstinct.com
SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy
-- DistributedDistributed BlockChainBlockChain Payment NetPayment Net --
93
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy
-- DistributedDistributed BlockChainBlockChain Payment NetPayment Net --
94
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
95
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level”
“YOUR Cyber Mission”“YOUR Cyber Mission”
22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends
77 –– Scenario 2040Scenario 2040: Artificial Silicon Life!: Artificial Silicon Life!
“Neural Security”“Neural Security”
96
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!!
“New Cyber Toolkit”“New Cyber Toolkit”
9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!..
“CyberSecurity Plan”“CyberSecurity Plan”
“Neural Security”“Neural Security”
ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society”
97
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures!
19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society”
98
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures!
19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
ScenarioScenario 20402040:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
99
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 20402040:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
100
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
101
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society”
•• RealReal--Time Security Operations:Time Security Operations:
– Secure and monitor every cyber asset and critical physical asset through IP
Networking, RFID Tagging & communication of status to operations centre
•• Augmented & Immersive Reality:Augmented & Immersive Reality:
– Multimedia virtual world overlays on data from the real physical world,
through head-up displays & other forms of embedded sensors & displays
•• Bio Neural Metaphors:Bio Neural Metaphors:
– Further developments of self-organising and autonomous systems for
monitoring and responding to cyber alerts & attacks in real-time
102
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
monitoring and responding to cyber alerts & attacks in real-time
•• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling:
– Adaptive 3D computer modelling of physical buildings, campuses & cities,
as well as dynamic models of extended enterprises networks. The aim is to
visualise, model & respond to security alerts with greater speed & precision
•• “Smart Security” Architectures:“Smart Security” Architectures:
– Effective integrated security requires management through hybrid
hierarchical and “peer-to-peer” organisational architectures. Living organic
systems also exploit hybrid architectures for optimal command & control
102
ScenarioScenario 20402040: Cyber Defence:: Cyber Defence:
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
103
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds””
•• Neural AI/ML CyberSecurityNeural AI/ML CyberSecurity Solutions will require
enhanced Intelligent Human/Machine Interfaces!
• Human Communications run @ Sound Speed....@ Sound Speed.... whilst
Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!..
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
104
-- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 --
*** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” ***
Seville, Spain – 20th–21st November 2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
Software(SW) will “Bridge” Human & Cyber Worlds!
....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces
for Security Management during the next 7 Years!....7 Years!....
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!

More Related Content

What's hot

Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 

What's hot (20)

Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 

Similar to CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!

Similar to CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! (13)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 

More from Dr David Probert

More from Dr David Probert (6)

From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!

  • 1. • Security Futures:Security Futures: 20182018--20252025++ TTechnology,echnology, TToolsools && TTrendsrends 1 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference TTechnology,echnology, TToolsools && TTrendsrends Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--SonsSons -- Ethan, Matthew, Roscoe & HughEthan, Matthew, Roscoe & Hugh -- Securing YOUR Future!Securing YOUR Future!
  • 2. • Фьючерсы на БезопасностьФьючерсы на Безопасность:: 20182018--2025+2025+ 2 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ТТехнологии,ехнологии, ИИнструменты инструменты и ТТенденцииенденции Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational
  • 3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 3 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 6. CyberCyber Futures & Defence:Futures & Defence: “Dual Themes”“Dual Themes” Theme (1)”Theme (1)” -- “Security Futures:“Security Futures: 20182018--2025+2025+” :” : TTechnology,echnology, TTools andools and TTrends...rends... -- Bringing CyberSecurity toBringing CyberSecurity to YOURYOUR Board Room with Budget & Mission!Board Room with Budget & Mission! -- FutureFuture CyberCyber--ScenariosScenarios for Integrated, Adaptive, Intelligent Security!for Integrated, Adaptive, Intelligent Security! -- New CyberSecurity Toolkits to DefendNew CyberSecurity Toolkits to Defend YOURYOUR Business Operations!Business Operations! ““ CyberVision: Machine Learning, AI & Neural Security“CyberVision: Machine Learning, AI & Neural Security“ 2121stst Nov: 09:40Nov: 09:40–– 10:2010:20 6 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ThemeTheme (2)(2) –– “Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent CyberSecurity for OUR 21Intelligent CyberSecurity for OUR 21stst C...C... -- TOP 10 CyberThreatsTOP 10 CyberThreats: Exploration, Penetration and Attack!: Exploration, Penetration and Attack! -- RecentRecent Case StudiesCase Studies of Cyber Crime, Terror & Political Attacks!of Cyber Crime, Terror & Political Attacks! -- DevelopingDeveloping YOURYOUR Action Plans & Cybersecurity Programme!Action Plans & Cybersecurity Programme! ““CyberDefenceCyberDefence: Real: Real--Time Learning, Detection & Alerts”Time Learning, Detection & Alerts” 2121stst Nov: 14:30Nov: 14:30 –– 15:1015:10 Download SlideDownload Slides:s: www.valentina.net/Seville2017/www.valentina.net/Seville2017/
  • 7. Topics suggestedTopics suggested @@ GenoaGenoa –– June 2017June 2017 1.1. Biometrics in the 21Biometrics in the 21stst Century forCentury for Global SecurityGlobal Security 2.2. IT Security Trends:IT Security Trends: Key Business & Security DriversKey Business & Security Drivers 3.3. Managing Information Risk :Managing Information Risk : Solutions for SurvivalSolutions for Survival 4.4. Modern Technical Security Tools for ProtectionModern Technical Security Tools for Protection 5.5. Technical Innovations inTechnical Innovations in Access Control SecurityAccess Control Security 7 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 5.5. Technical Innovations inTechnical Innovations in Access Control SecurityAccess Control Security 6.6. Managing Enterprise Security in Changed WorldManaging Enterprise Security in Changed World 7.7. Effective IT Security:Effective IT Security: Prevent & Adapt to ThreatsPrevent & Adapt to Threats ......We’ll respond to......We’ll respond to ALLALL these during this talk onthese during this talk on “Security Futures”:“Security Futures”: TTechnology, Tools &echnology, Tools & TTrendsrends
  • 8. 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” “YOUR Cyber Mission“YOUR Cyber Mission”” 22 ––CyberCyberCrime:Crime:CyberTCyberTerror:error:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” (1)(1)--SecuritySecurity 20182018--20252025:: YOURYOUR CyberCyber MissionMission 8 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “YOUR Cyber Mission“YOUR Cyber Mission”” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. “Neural Security”“Neural Security” 88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “New Cyber Toolkit”“New Cyber Toolkit” 9 –YOURYOUR Action Plan for 21stC Cyber!..Action Plan for 21stC Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan”
  • 9. 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” “YOUR Cyber Mission“YOUR Cyber Mission”” 22 ––CyberCyberCrime:Crime:CyberTCyberTerror:error:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” (1)(1)--SecuritySecurity 20182018--20252025:: YOURYOUR CyberCyber MissionMission 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 9 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “YOUR Cyber Mission“YOUR Cyber Mission”” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. “Neural Security”“Neural Security” 88–– CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “New Cyber Toolkit”“New Cyber Toolkit” 9 –YOURYOUR Action Plan for 21stC Cyber!..Action Plan for 21stC Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan” 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” “YOUR Cyber Mission”“YOUR Cyber Mission”
  • 10. ““CyberSecurityCyberSecurity @@ Board Level”Board Level” •• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and Governments to Plan & Invest @@ Board LevelBoard Level! • CyberSecurity Tools are now in TransitionTransition from: – 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls –– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence • Smart IoT Devices, Homes & Cities ALL require 10 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • Smart IoT Devices, Homes & Cities ALL require Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks! ....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for C$OC$O led Investment in Effective Cyber Defence!
  • 11. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 11 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
  • 12. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 12 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks ......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
  • 13. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence: 1) Appoint Board Level CSOBoard Level CSO in Leadership Role! 2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 13 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks ......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!... 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists 5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap 6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
  • 14. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar ““OUR CyberOUR Cyber Society”Society” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” (2)(2)--SecuritySecurity 20182018--20252025:: OUROUR CyberCyber SocietySociety 14 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!... “CyberSecurity Plan”“CyberSecurity Plan”
  • 15. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar ““OUR CyberOUR Cyber Society”Society” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” (2)(2)--SecuritySecurity 20182018--20252025:: OUROUR CyberCyber SocietySociety 22 ––CyberCrime:CyberTerror:CyberWarCyberCrime:CyberTerror:CyberWar ““OUR CyberOUR Cyber Society”Society” 15 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!... “CyberSecurity Plan”“CyberSecurity Plan” ““OUR CyberOUR Cyber Society”Society”
  • 16. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 16 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 17. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** Thrust SSC:Thrust SSC: 11stst Supersonic CarSupersonic Car -- 1515thth Oct 1997Oct 1997 17 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Thrust SSC:Thrust SSC: World Speed Record: 1997World Speed Record: 1997--20172017 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 18. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** BloodHoundBloodHound SSC 2017SSC 2017 18 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com 1997 Thrust SSC1997 Thrust SSC
  • 19. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 19 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!” SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 20. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 20 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 21. “Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018! -- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! -- • 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts) • 1948 – “Cybernetics” – Norbert Wiener • 1969 – ARPANet Launched – 4 Packet Switching Net Nodes - • 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn • 1982 – Elk Cloner - 1st “Apple Computer Virus • 1986 – “Brain” – 1st Microsoft MS-DOS Virus 21 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • 1986 – “Brain” – 1st Microsoft MS-DOS Virus • 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp) • 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee • 1993 – Mosaic Browser – NCSA – Illinois, USA • 2018 –Transition to AI/ML Apps for 21stC CyberSecurity! -- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
  • 22. OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+ •• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged “Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO” •• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed “Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things” 22 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to “Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools •• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
  • 23. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber“OUR Cyber Society”Society” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 23 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan”
  • 24. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber“OUR Cyber Society”Society” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security“Integrated Security”” 24 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan” “Integrated Security“Integrated Security””
  • 25. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated Security****** Integrated Security*** • Major Trends & Developments: Scenario 2018Scenario 2018: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 25 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
  • 26. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 26 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Shopping List!Shopping List! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
  • 27. “Real“Real--Time”Time” CCTVCCTV City SurveillanceCity Surveillance 27 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
  • 28. Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance 28 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
  • 29. Metro Surveillance:Metro Surveillance: Charing Cross, LondonCharing Cross, London 29 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 30. RealReal--TimeTime Surveillance:Surveillance: TransportationTransportation 30 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 31. Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management” 31 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 32. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 32 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 33. IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack •• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce YOUR Risks of Cyber Threats & Attacks... –– Device & Access AuthenticationDevice & Access Authentication by Fingerprints, Retinal/Iris Scan or Palm Vein Scan –– Facility AccessFacility Access with “Live” 3D Facial Recognition –– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked 33 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication –– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked CCTV & Real-Time Self-Learning Video Analytics –– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials – (CChemical, BBiological, RRadiological, NNuclear) ...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated with the CSO-led Business Security OperationsBusiness Security Operations
  • 34. TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions 34 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 35. CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions 35 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 36. CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics 36 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 37. CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans 37 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 38. CyberCyber Digital Forensics:Digital Forensics: PostPost--AttackAttack • Evidence from Cyber Digital Forensics can help to identify the Criminals, Terrorists and Cyber Attackers: •• Physical Forensics:Physical Forensics: – Blood & Tissue Samples – DNA & Genetic Analysis – Chemical Agents, GSR, Fibres •• Cyber Forensics:Cyber Forensics: 38 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Cyber Forensics:Cyber Forensics: – Cyber Attack IP Address/DNS/Proxies – Malware/Trojan/Virus Analysis – Botnet/DDOS , Targets & Payload – RansomWare/Encryption & Attack “Signatures” ...Evidence from BOTH Cyber & Physical ForensicsCyber & Physical Forensics will be relevant to 21stC Terror Threats & Attacks!...
  • 39. Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”! 39 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930 “Forensics Pioneer”“Forensics Pioneer” a)a) Detective WorkDetective Work b)b) FingerprintsFingerprints c)c) Ciphers & CodesCiphers & Codes d)d) FootprintsFootprints e)e) HandwritingHandwriting
  • 40. Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore 40 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 41. CyberCyber--Bio:Bio: Security Threat ScenariosSecurity Threat Scenarios •• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats •• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft •• Defence/Military:Defence/Military: Cyber-Espionage & Attacks •• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs •• Culture/Sports:Culture/Sports: Major Events & Competitions •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions 41 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions •• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege •• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records” ...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL Business Sectors & Critical Infrastructure!
  • 42. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 42 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference42 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan”
  • 43. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 43 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference43 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 –– YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan” “Self“Self--Adaptive Security”Adaptive Security”
  • 44. Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT” *** Adaptive Security****** Adaptive Security*** • Major Trends and Developments: Scenario 2020Scenario 2020 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 44 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 45. 20192019 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 45 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 46. “IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM 46 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 47. 47 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 48. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT” 48 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 49. IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture 49 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 50. EU/IERCEU/IERC –– Research Cluster Reports:Research Cluster Reports: ““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things 50 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 51. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 51 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 52. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 52 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!... Market Capitalisation ofMarket Capitalisation of 1000+1000+ CryptoCurrenciesCryptoCurrencies:: ****** $200 Billion+$200 Billion+ ******
  • 53. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 53 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 54. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 2 –CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 54 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference54 “YOUR Cyber Mission”“YOUR Cyber Mission” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!... “CyberSecurity Plan”“CyberSecurity Plan”
  • 55. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 2 –CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 55 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference55 “YOUR Cyber Mission”“YOUR Cyber Mission” “OUR Cyber Society”“OUR Cyber Society” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!...C Cyber!... “CyberSecurity Plan”“CyberSecurity Plan” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning Security”Learning Security”
  • 56. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can 56 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can mitigate risks of new malware that have no prior “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 57. “Surfing the Evolutionary“Surfing the Evolutionary Cyber Waves”Cyber Waves” -- More than 45 Years45 Years of AI & CyberSecurityAI & CyberSecurity! - • 1970 – BT Research Labs – IBM 360 –Digital PCM • 1976 – AI Thesis – Stochastic Learning Automata • 1982 – AI & Expert Systems: UK Govt Programme • 1991 – EARN/TERENA: European Networks Board • 1992 – International Net Conference: RAS, Moscow • 1994 – EMEA – Internet, Security & eCommerce 57 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • 1994 – EMEA – Internet, Security & eCommerce • 2007 – Georgian Parliament Security Projects • 2009 – Armenia eGovernance & CyberSecurity • 2010 – Georgian Cybersecurity Audit & Roadmap ......Global Marketplace for......Global Marketplace for ”Cyber” AI/ML Apps”Cyber” AI/ML Apps willwill mainstream during themainstream during the Next 7 Years: 2018Next 7 Years: 2018 –– 20152015 !!
  • 58. BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970 58 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
  • 59. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 59 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference David ProbertDavid Probert
  • 60. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 60 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 61. Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000” -- 2001:2001: A Space OdysseyA Space Odyssey (1968)(1968) -- 61 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 62. Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000” -- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) -- 62 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
  • 63. ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools” *** Self*** Self--Learning Security ***Learning Security *** • Major Trends and Developments: Scenario 2025Scenario 2025 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 63 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 64. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 64 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 65. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 65 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 66. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 66 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 67. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm 67 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 68. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 68 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 69. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 69 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 70. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 70 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 71. SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure 71 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
  • 72. SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure 72 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
  • 73. SparkCognitionSparkCognition:: AI & Machine LearningAI & Machine Learning DeepArmourDeepArmour –– SparkPredictSparkPredict -- SparkSecureSparkSecure 73 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: SparkCognition.comSparkCognition.com –– Austin. Texas, USAAustin. Texas, USA
  • 74. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 2 –CyberCyberCrime:Crime:CyberCyberTerror:CTerror:CyberyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 74 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan”
  • 75. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 2 –CyberCyberCrime:Crime:CyberCyberTerror:CTerror:CyberyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent Security”Intelligent Security” 75 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan” “Cyber“Cyber--Intelligent Security”Intelligent Security”
  • 76. ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security” • Transition & Full Deployment of Enterprise-Wide AI/ML-based IntelligentIntelligent “CyberSecurity” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to 76 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to augment Classic Detection using “Known Bad”,“Known Bad”, and hence provide New Generation “Defence In“Defence In--Depth”Depth” • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both Traditional & Advanced AI/ML “Cybersecurity Tools”
  • 77. HybridHybrid 2121ststC Business OrganisationC Business Organisation -- Hierarchical & NetworkedHierarchical & Networked -- •• TransitionTransition from 20thC to 21stC Business, Governance & Security requires fundamental re-structuring of operations: –– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies - ”Pyramids””Pyramids” - to manually process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” 77 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” •• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of their extended nervous system (Brain & BodyBrain & Body) to optimise real-time learning and effective self-organising environmental adaptation! •• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks. ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
  • 78. 78 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 79. ** WorldWideWorldWide AIAI MarketPlaceMarketPlace ** (1) Investments & Acquisitions:(1) Investments & Acquisitions: 20122012 -- 20172017 79 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Source:Source: “Big“Big--Tech in AI”Tech in AI” -- CBCBInsightsInsights
  • 80. ** WorldWideWorldWide AIAI MarketPlaceMarketPlace ** (2) Investments & Acquisitions:(2) Investments & Acquisitions: 20122012 -- 20172017 80 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Source:Source: “Big“Big--Tech in AI”Tech in AI” -- CBCBInsightsInsights
  • 81. 81 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 82. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 82 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 83. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 83 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 84. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 84 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 85. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 85 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 86. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 86 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 87. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 87 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 88. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 88 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 89. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 89 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 90. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 90 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
  • 91. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 91 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
  • 92. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 92 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! ****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat *** www.deepinstinct.comwww.deepinstinct.com
  • 93. SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy -- DistributedDistributed BlockChainBlockChain Payment NetPayment Net -- 93 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
  • 94. SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy -- DistributedDistributed BlockChainBlockChain Payment NetPayment Net -- 94 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
  • 95. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 95 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan”
  • 96. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” “YOUR Cyber Mission”“YOUR Cyber Mission” 22 ––CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” SecuritySecurity 20182018--20252025: T: Techno,echno, TTools &ools & TTrendsrends 77 –– Scenario 2040Scenario 2040: Artificial Silicon Life!: Artificial Silicon Life! “Neural Security”“Neural Security” 96 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 8 – CyberCyber VISIONVISION to Securityto Security NOWNOW!! “New Cyber Toolkit”“New Cyber Toolkit” 9 – YOURYOUR Action Plan for 21Action Plan for 21ststC Cyber!..C Cyber!.. “CyberSecurity Plan”“CyberSecurity Plan” “Neural Security”“Neural Security”
  • 97. ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society” 97 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures! 19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
  • 98. ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society” 98 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures! 19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
  • 99. ScenarioScenario 20402040:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 99 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 100. ScenarioScenario 20402040:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 100 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 101. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 101 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 102. Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society” •• RealReal--Time Security Operations:Time Security Operations: – Secure and monitor every cyber asset and critical physical asset through IP Networking, RFID Tagging & communication of status to operations centre •• Augmented & Immersive Reality:Augmented & Immersive Reality: – Multimedia virtual world overlays on data from the real physical world, through head-up displays & other forms of embedded sensors & displays •• Bio Neural Metaphors:Bio Neural Metaphors: – Further developments of self-organising and autonomous systems for monitoring and responding to cyber alerts & attacks in real-time 102 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference monitoring and responding to cyber alerts & attacks in real-time •• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling: – Adaptive 3D computer modelling of physical buildings, campuses & cities, as well as dynamic models of extended enterprises networks. The aim is to visualise, model & respond to security alerts with greater speed & precision •• “Smart Security” Architectures:“Smart Security” Architectures: – Effective integrated security requires management through hybrid hierarchical and “peer-to-peer” organisational architectures. Living organic systems also exploit hybrid architectures for optimal command & control 102
  • 103. ScenarioScenario 20402040: Cyber Defence:: Cyber Defence: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 103 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 104. InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds”” •• Neural AI/ML CyberSecurityNeural AI/ML CyberSecurity Solutions will require enhanced Intelligent Human/Machine Interfaces! • Human Communications run @ Sound Speed....@ Sound Speed.... whilst Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!.. •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & 104 -- 2121ststC Security Futures: 2018C Security Futures: 2018 –– 20252025 -- *** “Technology, Tools & Trends” ****** “Technology, Tools & Trends” *** Seville, Spain – 20th–21st November 2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & Software(SW) will “Bridge” Human & Cyber Worlds! ....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces for Security Management during the next 7 Years!....7 Years!....