SlideShare ist ein Scribd-Unternehmen logo
1 von 101
Downloaden Sie, um offline zu lesen
CyberSecurity Vision:CyberSecurity Vision:
***2017***2017 –– 2027***2027***
1
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
***2017***2017 –– 2027***2027***
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
ВидениеВидение КибербезопасностиКибербезопасности
*** 2017*** 2017 –– 2027 ***2027 ***
2
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
*** 2017*** 2017 –– 2027 ***2027 ***
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
“Smart“Smart CCybersecurity”:ybersecurity”: Dual ThemesDual Themes
Theme (1)Theme (1) –– ..........2121ststC Smart Security ArchitecturesC Smart Security Architectures forfor YOURYOUR Business.....Business.....
--
“Integration”“Integration” :: “SMART Real“SMART Real--Time Security & Surveillance”Time Security & Surveillance” 11:4511:45 2121stst Nov 2016Nov 2016
“Smart Security” Integrates Cyber & Physical Technologies to provide“Smart Security” Integrates Cyber & Physical Technologies to provide
Effective RealEffective Real--Time Surveillance for both Business & Government.Time Surveillance for both Business & Government.
We review Practical Applications forWe review Practical Applications for YOURYOUR Critical Business Sectors.Critical Business Sectors.
6
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
ThemeTheme (2)(2) –– ..........CyberSecurity Vision:CyberSecurity Vision: 20172017 –– 2027 & Beyond.....2027 & Beyond.....
--
“Intelligence”:“Intelligence”: ”ADAPTIVE Self”ADAPTIVE Self--Learning CyberSecurity for IoT”Learning CyberSecurity for IoT” 09:00 2209:00 22ndnd Nov 2016Nov 2016
Download SlideDownload Slides:s: www.valentina.net/Rome2016/www.valentina.net/Rome2016/
CyberSecurity is becoming transformed with RealCyberSecurity is becoming transformed with Real--Time Cyber ToolsTime Cyber Tools
based upon Artificial Intelligence & Machine Learning. These arebased upon Artificial Intelligence & Machine Learning. These are
EssentialEssential to win the war against CyberCrime and CyberTerrorismto win the war against CyberCrime and CyberTerrorism
GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- “Worldwide Internet Census 2012”“Worldwide Internet Census 2012” --
7
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1)
8
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2)
9
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
10
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Worldwide Hyperbolic Map ofWorldwide Hyperbolic Map of Internet ConnectivityInternet Connectivity -- Link:Link: www.CAIDA.orgwww.CAIDA.org
WorldwideWorldwide Hyperbolic ModelsHyperbolic Models of Internetof Internet
11
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Link:Link: www.CAIDA.orgwww.CAIDA.org :: CenterCenter for Applied Internet Data Analysisfor Applied Internet Data Analysis
-- University of CaliforniaUniversity of California -- San Diego SupercomputerSan Diego Supercomputer CenterCenter --
11 ––““Cyber Crime, Cyber Terror & Cyber War”Cyber Crime, Cyber Terror & Cyber War” 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
12
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 – Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 8–From CyberVision to Business Reality! 9 –YOURYOUR Action Plan for 21stC Cyber!...
“CyberVision:“CyberVision: 20172017 –– 2027”2027”
•• My Vision:My Vision: My Personal “CyberVision”“CyberVision” develops practical
scenarios for the next 10-15 Year Evolution of Cybersecurity
•• World Transition:World Transition: From 2020ththC PhysicalC Physical to 2121ststC Cyber WorldC Cyber World
•• AI Evolution:AI Evolution: Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security
•• Marketplace:Marketplace: The Global CybersecuritCybersecurity Business Sector is
forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025
13
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025
•• CybersecurityCybersecurity is at the Core of 21stC Society: Pro-Active
Real-Time Defence against Worldwide 24/7 Threats from
*** Cyber Crime, Cyber Terrorism & Cyber Warfare ***Cyber Crime, Cyber Terrorism & Cyber Warfare ***
... We need to fully embed Intelligent & AdaptiveWe need to fully embed Intelligent & Adaptive
Cybersecurity within theCybersecurity within the “Internet of Things”“Internet of Things”
CyberCyber Crime,Crime, CyberCyber Terror &Terror & CyberCyber WarWar!!
•• 2121ststCC CyberCyber Security:Security: New security threats &
attacks hit our media screens EVERY Day!
•• HybridHybrid CyberCyber--Physical:Physical: The “Bad Guys” now
exploit hybrid weapons with hybrid cyber-
physical attacks on critical info infrastructure
14
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• 25 Year25 Year CyberCyber Vision:Vision: Business & Government
need to Urgently deploy New Generation
AI/ML Security Solutions to “Win”“Win” the “War”“War”
OurOur “Cyber“CyberVisionVision”” provides the basis for designing practical Strategies, Action Plansprovides the basis for designing practical Strategies, Action Plans
and Roadmaps to combatand Roadmaps to combat CyberCyberCrime,Crime, CyberCyberTerrorTerror && CyberCyberWarWar forfor YOURYOUR Business!Business!
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
15
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
16
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
17
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
18
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
Red Alert!Red Alert!
19
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting
Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne
20
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
£1.9bn Cybercrime Budget£1.9bn Cybercrime Budget
UK National Cyber CentreUK National Cyber Centre
National Cyber Crime UnitNational Cyber Crime Unit
“CyberWar”“CyberWar” Strategies & Models fromStrategies & Models from Classic WorksClassic Works!!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
CybersecurityCybersecurity
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
CybersecurityCybersecurity
21
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!
CybersecurityCybersecurity
Specialists!Specialists!
CybersecurityCybersecurity
Specialists!Specialists!
“CyberWar”“CyberWar” Strategies & Models fromStrategies & Models from Classic WorksClassic Works!!
22
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!
1 – Cyber Crime, Cyber Terror & Cyber War 22 –– CyberVision:CyberVision: 2121ststC Players & Threats!C Players & Threats! 3 – CyberSecurity: 21stC Radical Innovation
4 –Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
23
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 –Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 –Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
CyberVision:CyberVision: “21“21ststC Players & Threats”C Players & Threats”
•• Cyber Criminals:Cyber Criminals: Seeking commercial gain from hacking
banks & financial institutions as well as phishing scams
through Email, Social Media & Encryption Ransom WareRansom Ware.
•• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical
business assets, and national infrastructurenational infrastructure for aims
relating to “political power”, “shock” & “terror branding”.
•• Cyber Espionage:Cyber Espionage: Using stealthy IT “Malware & Bots”Malware & Bots” to
penetrate both corporate & military data servers in order
24
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Cyber Espionage:Cyber Espionage: Using stealthy IT “Malware & Bots”Malware & Bots” to
penetrate both corporate & military data servers in order
to obtain plans & intelligence.
•• Cyber Hacktivists:Cyber Hacktivists: Groups such as “Anonymous”“Anonymous” with
Political Agendas that hack sites & servers to virally
communicate the “message” for specific campaigns.
......ALLALL thesethese “Bad Guys”“Bad Guys” have access to IT/Computing Professionals , and launchhave access to IT/Computing Professionals , and launch
attacks withattacks with “Intelligent Bots”“Intelligent Bots”, “, “SelfSelf--modifying Malware”modifying Malware” && Cyber Tools KitsCyber Tools Kits
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19971997--20172017
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
25
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security RisksHigh Security Risks:: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19971997--20172017
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
26
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security RisksHigh Security Risks:: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 33 –– CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios
4 –Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
27
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 –Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 –Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios
•• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to
allow theft or corruption of Cyber Information / IT Data Bases ,
Personal ID / Financial Data and Confidential Company Plans
•• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls &
IT Databases to allow Criminals/Terrorists to enter Target
Facilities (such as Banking/Finance, Telco/Mobile Operations)
•• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the
28
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the
weakest links which in the 21stC will be BOTHBOTH Cyber Network
Operations, Physical Security Operations & Internet of Things!
.......Cyber AttacksCyber Attacks are now fully industrialised with Malicious
Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKWEBDARKWEB
GlobalGlobal “Real“Real--Time”Time” DarkWebDarkWeb CyberAttacksCyberAttacks
29
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
2020thth June 2014 :June 2014 : GlobalGlobal CyberAttacksCyberAttacks @@ “Speed of Light”“Speed of Light”
Typical C2Typical C2
MalwareMalware
SignaturesSignatures
30
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
SignaturesSignatures
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
20172017--2027:2027: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
31
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
WWWW Internet ConnectionsInternet Connections –– IPv4 & IPv6IPv4 & IPv6
32
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
CybersecurityCybersecurity Market Size & GrowthMarket Size & Growth
•• 2015:2015: Worldwide EstimatedWorldwide Estimated - $97$97 Billion
•• 2020:2020: Worldwide ProjectedWorldwide Projected - $170$170 Billion
–– North America:North America: - $64Bn – 10.0% CAGR (38%)
–– Europe:Europe: - $39Bn – 7.2% CAGR (23%)
–– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%)
33
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
–– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%)
–– Middle East & Africa:Middle East & Africa: - $15Bn – 13.7% CAGR (9%)
–– Latin America:Latin America: - $14Bn –17.6% CAGR (8%)
(SourceSource: “Micro Market Monitor” & “Markets and Markets” –
Estimated and Extrapolated from projections for 20142014 –– 20192019)
•• 2025:2025: WorldwideWorldwide @ 10% CAGR - $275$275 Billion
34
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
2020: Hardware2020: Hardware Encrypted SystemsEncrypted Systems -- $252$252 BnBn -- 55%55% CAGR (Hard Disks, USB, Custom)CAGR (Hard Disks, USB, Custom)
2020 : Software2020 : Software Encrypted SystemsEncrypted Systems -- $6$6 BnBn –– 21%21% CAGR (Cloud, Mobile, Database)CAGR (Cloud, Mobile, Database)
Source:Source: (1) Global Industry Analysts Inc (H/W)Global Industry Analysts Inc (H/W) –– (2) Markets and Markets (S/W)(2) Markets and Markets (S/W)
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
44 ––Scenario 2018Scenario 2018 –– CSO: CCSO: C--Suite IntegrationSuite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
35
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference35
44 ––Scenario 2018Scenario 2018 –– CSO: CCSO: C--Suite IntegrationSuite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 –Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 –In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
OurOur CyberVisionCyberVision:: 2017 to 20252017 to 2025
•• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged
“Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO”
•• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoT:IoT: DistributedDistributed
36
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoT:IoT: DistributedDistributed
“Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things”
•• ScenarioScenario 20252025 –– Intelligent Security:Intelligent Security: Transition toTransition to
RealReal--TimeTime “AI/ML”“AI/ML” Cybersecurity Tools & SolutionsCybersecurity Tools & Solutions
ScenarioScenario 20182018 –– CSO: CCSO: C--Suite IntegrationSuite Integration
•• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security managed
with minimal common operations
•• 2121ststC CSO Model:C CSO Model: Business & Government urgently
need to manage TOTAL Cyber-Physical Operations at C-
Suite Board Level - “CSO“CSO -- Chief Security Officer!”Chief Security Officer!”
37
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Investment Plan:Investment Plan: CSOs need full Professional Teams &
Investment Budget to manage both Physical & Cyber
security risks, threats and attacks!
..........Corporate SecurityCorporate Security now requires Strategicnow requires Strategic
Management, Budget @Management, Budget @ Board Director Level!Board Director Level!
CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations
•• CybersecurityCybersecurity for Government, Business & Critical Sectors can now be
integrated with operational security solutions (PSIM&SIEMPSIM&SIEM) including:
1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities
2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Traffic & Parking
3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with CCTV & Alarm Control Centres
4)4) Personnel RFIDPersonnel RFID and BiometricsBiometrics for Office, Warehouse & Campus Access Controls
5) Professionally trained Security Personnel & GuardsSecurity Personnel & Guards – 24/7 – for top security facilities
6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors
38
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors
7)7) Intelligent PerimeterIntelligent Perimeter security controls for campuses and critical service facilities such
as airports, power stations, refineries, hospitals and government institutions
8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities
9) Focus upon in-depth Access ControlAccess Control for computer server rooms & data storage
“Integrated Real“Integrated Real--TimeTime CyberCyber--PhysicalPhysical Security Operations”Security Operations”
“SMART SECURITY”=“SMART SECURITY”=Cyber+PSIM+SIEMCyber+PSIM+SIEM
Key Cybersecurity VenturesKey Cybersecurity Ventures -- USAUSA
•• FireEyeFireEye –– Next Generation Security
•• NorseNorse –– In-Depth Real-Time Intel
•• CylanceCylance –– AI/ML Threat DetectionAI/ML Threat Detection
•• DB NetworksDB Networks –– Real-Time ML Defence
LanCopeLanCope –– Security Threat IntelligenceSecurity Threat Intelligence
•• AlienVaultAlienVault –– Intelligent Security
•• RSARSA –– Big Data & Cloud Security
• Palantir –Analytics & Fraud
• Daon – Biometics & ID Mgt
• Akamai –Cloud & Mobile
• Qualys – Cloud Security
• Blue Coat – Business AssuranceBusiness Assurance
• Arbor Networks – DDoS Attack
• Zscaler – Security Services
39
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• RSARSA –– Big Data & Cloud Security
•• VeraCodeVeraCode –– Secure Code Analytics
•• Palo Alto NetworksPalo Alto Networks –– Next Gen Cyber
•• Resilient SystemsResilient Systems –– Auto Threat Alert
•• PrelertPrelert –– Machine Learning Solutions
• Barracuda Networks – Firewalls+
• Zscaler – Security Services
• Sonatype – Enterprise Security
• Okta –Identity Management
• Skybox Security –Risk Analytics
• LogRhythm – Log Mgt Analytics
• PKWare – Data Encryption
USA/CanadaUSA/Canada is estimated to beis estimated to be 38% ($37Bn)38% ($37Bn) of Globalof Global CyberSecurityCyberSecurity MarketplaceMarketplace
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
40
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference40
4 –Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
55 ––ScenarioScenario 20202020 –– Internet of Things(IoT)Internet of Things(IoT)
““Adaptive”Adaptive”
6 –Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 –In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
ScenarioScenario 2020:2020: “Internet of Things”“Internet of Things”
•• CyberCyber--Enterprise:Enterprise: During the next 3-5 years of Cyber
Evolution, the Internet will extend to practically ALL our IT
enabled devices within Cars, Homes, Business, and CitiesCars, Homes, Business, and Cities!
This is defined as the “Internet of Things - IoT”
•• Extended Security:Extended Security: ALL IoT connected devices, nodes &
servers (Legacy & NewLegacy & New) must be secured against attack!
41
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
servers (Legacy & NewLegacy & New) must be secured against attack!
•• CSO Challenge:CSO Challenge: The IoT is alreadyalready the next 21stC Cyber
Conflict Zone and Security Challenge for Enterprise CSOs!
.... CyberCyber DDoSDDoS AttacksAttacks (MiraiMirai BotNetBotNet on DYN Incon DYN Inc) during
Sept/Oct 2016 demonstrate the VulnerabilityVulnerability of “IoT”
Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution
42
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
EUEU “IoT”“IoT” Programme Visions forProgramme Visions for “NOW”“NOW” && 20202020
43
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT”
44
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
CyberCyber 20202020 Visions:Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton
and The Australian Government (Defence)and The Australian Government (Defence)
45
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
46
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 – Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
66 –– Scenario 2025Scenario 2025 –– AI & Machine LearningAI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security”
• Transition & Full Deployment of Enterprise-Wide
AI/ML-based IntelligentIntelligent “CyberSecurity” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of
Net Traffic, System/Event Logs, Net Nodes, Servers,
Databases, Devices & Users
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
47
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
augment Classic Detection using “Known Bad”,“Known Bad”, and
hence provide New Generation “Defence In“Defence In--Depth”Depth”
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both Traditional &
Advanced AI/ML “Cybersecurity Tools”
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
48
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
mitigate risks of new malware that have no prior “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm
49
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Technology Visions:Technology Visions: ScenarioScenario 20252025
50
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios
*** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon ***
51
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
TowardsTowards 20252025 :: ““Smart Security Solutions”Smart Security Solutions”
• The Application of Artificial Intelligence and Machine Learning
allows us to develop “Smart Security Solutions”“Smart Security Solutions” as follows:
……..……..”Smart Security Solutions””Smart Security Solutions” typically possess the following features:typically possess the following features:
1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks
2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
52
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to
scale in space & time from micro cells to macro solutions
6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from
Global Social Networks, Search & On-Line Trade & Commerce
7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations
………Now we’ll consider how………Now we’ll consider how ““AI & Machine Learning”AI & Machine Learning” principles are
being engineered intobeing engineered into 2121ststC Cybersecurity Solutions & Services...C Cybersecurity Solutions & Services...
Building ourBuilding our 20252025 Smart SecuritySmart Security ToolkitToolkit
(1) Smart(1) Smart DecisionDecision PrinciplesPrinciples -- “D“D--Genes”Genes”
•• Business DecisionsBusiness Decisions require focusing & filtering of Big Data
sources in Space-Time to create local knowledge (Data Mining).
Hence a useful metaphor is the “Knowledge Lens”:“Knowledge Lens”:
– Smart Decision “Genes”“Genes” = Space, Time and Information Focus
– Conceptual ““Knowledge Lens”Knowledge Lens” can filter and focus information in
“Space” from searching Big Data Sets to a Small focused Short-List
53
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
“Space” from searching Big Data Sets to a Small focused Short-List
– The “Knowledge Lens”“Knowledge Lens” can focus information & present in real-time,
possibly as an stream of multi-media news or market intelligence
•• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle
in the design of Smart SecuritySmart Security, Smart Business & Smart Governance
....21stC....21stC Cyber AttacksCyber Attacks occur in Realoccur in Real--TimeTime @Optical Speeds@Optical Speeds
so ultra fast analysis, decisions and action is a must!so ultra fast analysis, decisions and action is a must!
Building ourBuilding our 20252025 Smart SecuritySmart Security ToolkitToolkit
(2) Smart(2) Smart LearningLearning PrinciplesPrinciples -- “L“L--Genes”Genes”
•• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and
Scalable Architecture. The Decision “Genes” are relatively traditional whilst
these new Learning “Genes” lie at the heart of Smart Security.
–– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living
systems and communities which include the well known self-
organisation of insect roles in communities such as ants & bees.
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from
54
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from
simple mathematical rules, as in Conway’s “Game of Life”“Game of Life”
–– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in
complex chaotic behaviour as found in real world insect populations
–– Scalable ArchitectureScalable Architecture is also an essential feature of plants & animal
life & Mandelbrot’s theory of Fractal Curves provides vivid examples.
.....Current Trends:.....Current Trends: Research into AI, Machine Learning, Self-Organisation &
Adaptation remains highly active in both Universities & Commercial R&D Labs
HybridHybrid 2121ststC Business OrganisationC Business Organisation
-- Hierarchical & OrganicHierarchical & Organic --
•• TransitionTransition from 20thC to 21stC Business, Governance & Security
requires fundamental re-structuring of operations:
–– 2020ththC Industrial Organisations:C Industrial Organisations: Hierarchical Bureaucracies
- ”Pyramids””Pyramids” - to manually process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer
Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds”
55
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds”
•• Living SystemsLiving Systems, such as Mammals, use Hybrid Organisation of
their extended nervous system (Brain & BodyBrain & Body) to optimise real-
time learning and effective environmental adaptation!
•• Smart Security SolutionsSmart Security Solutions will also require HybridHybrid organisation
to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
ScenarioScenario 20252025 Business will evolve to “Smart”Business will evolve to “Smart” ––HybridHybrid–– Security Operations!Security Operations!
20252025 : Designing “: Designing “Smart Security”Smart Security”
•• Smart Security SolutionsSmart Security Solutions all use combinations of these Basic ICT
Learning & Decision “genes” shared with Intelligent Living Systems:
1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked)
2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time & Decision Focus
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
56
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
4)4) Smart Security Solutions and Services:Smart Security Solutions and Services: Integration of Decision
and Learning “Genes”, within Secure & Resilient Systems Environment
.....Using “.....Using “AI & Machine Learning”AI & Machine Learning”,, 2121ststC Cyber Ventures are nowC Cyber Ventures are now
marketing “Smart”marketing “Smart” SelfSelf--Learning CybersecurityLearning Cybersecurity Tools to secureTools to secure
Enterprises, Government & Critical Information InfrastructureEnterprises, Government & Critical Information Infrastructure!!
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
57
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
58
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
59
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
60
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
61
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb
Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl”
62
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society”
•• RealReal--Time Security Operations:Time Security Operations:
– Secure and monitor every cyber asset and critical physical asset through IP
Networking, RFID Tagging & communication of status to operations centre
•• Augmented & Immersive Reality:Augmented & Immersive Reality:
– Multimedia virtual world overlays on data from the real physical world,
through head-up displays & other forms of embedded sensors & displays
•• Bio Neural Metaphors:Bio Neural Metaphors:
– Further developments of self-organising and autonomous systems for
monitoring and responding to cyber alerts & attacks in real-time
63
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
monitoring and responding to cyber alerts & attacks in real-time
•• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling:
– Adaptive 3D computer modelling of physical buildings, campuses & cities,
as well as dynamic models of extended enterprises networks. The aim is to
visualise, model & respond to security alerts with greater speed & precision
•• “Smart Security” Architectures:“Smart Security” Architectures:
– Effective integrated security requires management through hybrid
hierarchical and “peer-to-peer” organisational architectures. Living organic
systems also exploit hybrid architectures for optimal command & control
63
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
64
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Algorithmic Computer Trading using Real-Time Neural Nets
& Statistical Maths Tools have been used for 20+ Years!
.....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent
realreal--time forecasts for Enterprise Cybersecurity Threats!time forecasts for Enterprise Cybersecurity Threats!
BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040
65
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
66
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
ScenarioScenario 20402040: Cyber Defence:: Cyber Defence:
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
67
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society”
68
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures!
19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society”
69
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures!
19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
70
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 – Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
77 –– InIn--Depth:Depth: Critical Sector ScenariosCritical Sector Scenarios 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
7) Future Security Tools:7) Future Security Tools: ““Critical Sectors”Critical Sectors”
• Adaptive & Intelligent Security Solutions are Crucial to the
Defence of CriticalCritical National Infrastructure & OUROUR Cities:
a)a) Power Stations:Power Stations: Particularly Nuclear Energy Sites
b)b) Government Offices:Government Offices: Parliaments & Govt Ministries
c)c) Oil/Gas/Chemical Facilities:Oil/Gas/Chemical Facilities: Risk of Fires/Explosions
d)d) Airports/Metro/Trains:Airports/Metro/Trains: ALL Transport Transit Hubs
71
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
d)d) Airports/Metro/Trains:Airports/Metro/Trains: ALL Transport Transit Hubs
e)e) Cultural/Sports :Cultural/Sports : Theatres, Olympics, World Cup
f)f) Tourist Resorts & Sights:Tourist Resorts & Sights: High Economic Impact
...Physical Security is no longer an effective defence!......Physical Security is no longer an effective defence!...
NowNow CrucialCrucial to Deploy & Integrateto Deploy & Integrate Cyber SolutionsCyber Solutions thatthat
protect User Access, Data Bases & Trackprotect User Access, Data Bases & Track “Bad Guys”!“Bad Guys”!
Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures
72
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture
73
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework
74
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
4 – Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 – Scenario 2025 - AI & Machine Learning
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
75
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 – Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 88 –– From CyberVision to Business Reality!From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
FromFrom CyberVisionCyberVision toto Business RealityBusiness Reality!!
•• 2020ththCC -- Past Research:Past Research: Adaptive AI/ML algorithms have
been researched since 1960s/1970s. Computer Network
Architectures now support such intelligent solutions!
•• 20172017 -- Present Vision:Present Vision: Start-Ups such as DarkTrace are
now successfully marketing Intelligent Security Solutions
•• 20252025 -- Future Reality:Future Reality:
76
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• 20252025 -- Future Reality:Future Reality: Most Businesses & Government
will deploy AI/ML Security Solutions within 5 to 10 years.
ALLALL Corporate & Government CSO’sCorporate & Government CSO’s will eventually need towill eventually need to
upgrade toupgrade to IntelligentIntelligent RealReal--Time SecurityTime Security to defend againstto defend against
Cyber Crime, Cyber Terrorism and Cyber War!Cyber Crime, Cyber Terrorism and Cyber War!
-- ““Innovative”Innovative” CybersecurityCybersecurity VenturesVentures --
“AI & Machine Learning Solutions”“AI & Machine Learning Solutions”
•• Darktrace (UK)Darktrace (UK) –– Enterprise Immune System – Real-Time Modelling of
Traffic, Nodes & Users – AI/ML Bayesian Learning
•• CylanceCylance (US)(US) –– Next Generation Anti-Virus and Enterprise APT
•• Deep Instinct (Israel)Deep Instinct (Israel) – Real-Time APT Protection with AI/ML
•• DB Networks (US)DB Networks (US) –– Real-Time Advanced Threat Database Analytics &
Cybersecurity
•• PrelertPrelert (US)(US) – Behavioural Analytics Platform for Detection of Database
77
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
•• PrelertPrelert (US)(US) – Behavioural Analytics Platform for Detection of Database
Threats & Anomalies
•• MinerEyeMinerEye (Israel)(Israel) –– “Self-Learning” Data Loss Prevention with In-Depth
Intelligent Classification
•• LightCyberLightCyber (US)(US) – AI/ML Behavioural Profiling & Attack Detection
•• LogRhythmLogRhythm (US)(US) – “Machine Learning” Event Log Forensics
NewNew Cyber VenturesCyber Ventures based onbased on AI/MLAI/ML algorithms are startingalgorithms are starting--up everyup every MonthMonth!!
Cybersecurity VC Funding:Cybersecurity VC Funding: 20102010 -- 20142014
78
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Source:Source: CBInsightsCBInsights - www.cbinsights.com/blog/cybersecurity-startup-financing/
SummarySummary -- 2009/20142009/2014 -- $7.3Billion$7.3Billion VC InvestmentVC Investment in 1028+1028+ VenturesVentures
Darktrace:Darktrace: Cyber Intelligence PlatformCyber Intelligence Platform
79
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
LogRhythmLogRhythm:: Machine Learning ForensicsMachine Learning Forensics
80
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
LogRhythm’sLogRhythm’s Security Intelligence PlatformSecurity Intelligence Platform
Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling
81
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
82
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
83
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation
4 – Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 – Scenario 2025 - AI & Machine Learning
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
84
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4 – Scenario 2018 - CSO: C-Suite Integration
“Integrated”“Integrated”
5 –Scenario 2020 – Internet of Things(IoT)
“Adaptive”“Adaptive”
6 – Scenario 2025 - AI & Machine Learning
“Intelligent”“Intelligent”
7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 99 –– YOURYOUR TOP 10 Actions & RoadMapTOP 10 Actions & RoadMap
YOURYOUR TOPTOP 1010 Actions & RoadMapActions & RoadMap
1)1) Assign CSOAssign CSO –– Chief Security OfficerChief Security Officer1)1) Assign CSOAssign CSO –– Chief Security OfficerChief Security Officer
withwith Strategic SecurityStrategic Security Action PlanAction Plan
2)2) ProfessionalProfessional CyberSecurity TrainingCyberSecurity Training
to International Certificationto International Certification -- CISSPCISSP
3)3) Implement International SecurityImplement International Security
Standards (ISO/IECStandards (ISO/IEC-- Biometrics)Biometrics)
4)4) Open Discussions with “Cyber”Open Discussions with “Cyber”
6)6) ICT: Hire Qualified Cybersecurity SystemsICT: Hire Qualified Cybersecurity Systems
Technology, Software & Operations TeamTechnology, Software & Operations Team
7)7) Review Security Risks & Connectivity of ALLReview Security Risks & Connectivity of ALL
Enterprise IP Legacy Assets & Devices (IoT)Enterprise IP Legacy Assets & Devices (IoT)
8)8) Design Practical MultiDesign Practical Multi--Year Roadmap forYear Roadmap for
Strategic Operational Security IntegrationStrategic Operational Security Integration
9)9) Professional Association Membership forProfessional Association Membership for
85
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
4)4) Open Discussions with “Cyber”Open Discussions with “Cyber”
Vendors and Trial AI/ML ToolsVendors and Trial AI/ML Tools
5)5) Profile YOUR Security Staff andProfile YOUR Security Staff and
Contractors for Possible RisksContractors for Possible Risks
9)9) Professional Association Membership forProfessional Association Membership for
Team Networking & Skill BuildingTeam Networking & Skill Building -- IPSAIPSA
10)10) Cyber Legal ProtectionCyber Legal Protection –– CheckCheck YourYour LegacyLegacy
Contracts for “Cyber Theft” Trading RisksContracts for “Cyber Theft” Trading Risks
NowNow YOURYOUR Business will be Fully Fit to Defend againstBusiness will be Fully Fit to Defend against ““Smart” CyberSmart” Cyber--PhysicalPhysical Attacks!Attacks!
MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified
by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG
86
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
“Real“Real--Time Security” @Time Security” @ “Light Speed”!“Light Speed”!
Machine LearningMachine Learning
Cybersecurity ToolsCybersecurity Tools
Provide RealProvide Real--TimeTime
“Light Speed”“Light Speed”
87
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
“Light Speed”“Light Speed”
Defence againstDefence against
Threats & Attacks!Threats & Attacks!
“Frog Spirit shows the Ring of Dark Matter around the Sun” - 2002
- Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov --
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
88
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
“CyberVision”:“CyberVision”: 2121ststC Business ArchitecturesC Business Architectures
International EastInternational East--West Security Conference: RomeWest Security Conference: Rome
“CyberVision”:“CyberVision”: 2121ststC Business ArchitecturesC Business Architectures
International EastInternational East--West Security Conference: RomeWest Security Conference: Rome
ThankThank--You!You!ThankThank--You!You!
89
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/
EastEast--West Security ConferenceWest Security Conference –– Rome 2016Rome 2016
-- “Smart CyberSecurity”“Smart CyberSecurity” -- Slides (PDF)Slides (PDF) --
90
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Download Link:Download Link: www.valentina.net/Rome2016/www.valentina.net/Rome2016/
Theme (1)Theme (1) ––“21“21ststC Smart Security”C Smart Security” Theme (2)Theme (2) ––“CyberVision: 2017“CyberVision: 2017--2027”2027”
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/
91
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
92
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
93
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2017 Editions2017 Editions.
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
94
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Download:Download: www.valentina.net/DigiTec2012/
“CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond!
3434thth International EastInternational East--West Security Conference: Rome, ItalyWest Security Conference: Rome, Italy
95
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
*** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing ***
SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres
96
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet...
15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes dieddied in Avalanchein Avalanche »»
Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents
97
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
-- SecureSecure Navigation in theNavigation in the ““Southern Seas”Southern Seas” --
““Captain James Horsburgh” (1762Captain James Horsburgh” (1762 –– 1836)1836)
Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore
Charting theCharting the “Southern Seas”“Southern Seas”
--“The India Directory”(1809)“The India Directory”(1809) --
for “The East India Company”for “The East India Company”
1)1) Horsburgh Island:Horsburgh Island: CocosCocos/Keeling Is/Keeling Is
2)2) Horsburgh Lighthouse: SingaporeHorsburgh Lighthouse: Singapore
3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives
98
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Horsburgh AtollHorsburgh Atoll
-- MaldivesMaldives --
Horsburgh IslandHorsburgh Island
--CocosCocos/Keeling/Keeling--
Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives
FromFrom “Smart Navigation”“Smart Navigation” toto “Smart Security”!“Smart Security”!
Dedicated to Memory of Edward Michael Horsburgh (1923Dedicated to Memory of Edward Michael Horsburgh (1923––2013)2013)
-- SecureSecure Navigation in theNavigation in the ““Southern Seas”Southern Seas” --
““Captain James Horsburgh” (1762Captain James Horsburgh” (1762 –– 1836)1836)
Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore
Charting theCharting the “Southern Seas”“Southern Seas”
--“The India Directory”(1809)“The India Directory”(1809) --
for “The East India Company”for “The East India Company”
1)1) Horsburgh Island:Horsburgh Island: CocosCocos/Keeling Is/Keeling Is
2)2) Horsburgh Lighthouse: SingaporeHorsburgh Lighthouse: Singapore
3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives
99
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Horsburgh AtollHorsburgh Atoll
-- MaldivesMaldives --
Horsburgh IslandHorsburgh Island
--CocosCocos/Keeling/Keeling--
Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives
FromFrom “Smart Navigation”“Smart Navigation” toto “Smart Security”!“Smart Security”!
Dedicated to Memory of Edward Michael Horsburgh (1923Dedicated to Memory of Edward Michael Horsburgh (1923––2013)2013)
100
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
101
CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond
“Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security”
- Rome, Italy – 21st-22nd November 2016 -
© Dr David E. Probert : www.VAZA.com ©
34th International East/West Security Conference
Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility

Weitere ähnliche Inhalte

Was ist angesagt?

Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 

Was ist angesagt? (20)

Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 

Andere mochten auch

Andere mochten auch (17)

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Evolution of Stochastic Learning Automata
Evolution of Stochastic Learning AutomataEvolution of Stochastic Learning Automata
Evolution of Stochastic Learning Automata
 

Ähnlich wie CyberSecurity Vision: 2017-2027 & Beyond!

What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 

Ähnlich wie CyberSecurity Vision: 2017-2027 & Beyond! (20)

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and Partners
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 

Mehr von Dr David Probert

Mehr von Dr David Probert (7)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

CyberSecurity Vision: 2017-2027 & Beyond!

  • 1. CyberSecurity Vision:CyberSecurity Vision: ***2017***2017 –– 2027***2027*** 1 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference ***2017***2017 –– 2027***2027*** Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
  • 2. ВидениеВидение КибербезопасностиКибербезопасности *** 2017*** 2017 –– 2027 ***2027 *** 2 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference *** 2017*** 2017 –– 2027 ***2027 *** Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
  • 3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 3 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
  • 6. “Smart“Smart CCybersecurity”:ybersecurity”: Dual ThemesDual Themes Theme (1)Theme (1) –– ..........2121ststC Smart Security ArchitecturesC Smart Security Architectures forfor YOURYOUR Business.....Business..... -- “Integration”“Integration” :: “SMART Real“SMART Real--Time Security & Surveillance”Time Security & Surveillance” 11:4511:45 2121stst Nov 2016Nov 2016 “Smart Security” Integrates Cyber & Physical Technologies to provide“Smart Security” Integrates Cyber & Physical Technologies to provide Effective RealEffective Real--Time Surveillance for both Business & Government.Time Surveillance for both Business & Government. We review Practical Applications forWe review Practical Applications for YOURYOUR Critical Business Sectors.Critical Business Sectors. 6 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference ThemeTheme (2)(2) –– ..........CyberSecurity Vision:CyberSecurity Vision: 20172017 –– 2027 & Beyond.....2027 & Beyond..... -- “Intelligence”:“Intelligence”: ”ADAPTIVE Self”ADAPTIVE Self--Learning CyberSecurity for IoT”Learning CyberSecurity for IoT” 09:00 2209:00 22ndnd Nov 2016Nov 2016 Download SlideDownload Slides:s: www.valentina.net/Rome2016/www.valentina.net/Rome2016/ CyberSecurity is becoming transformed with RealCyberSecurity is becoming transformed with Real--Time Cyber ToolsTime Cyber Tools based upon Artificial Intelligence & Machine Learning. These arebased upon Artificial Intelligence & Machine Learning. These are EssentialEssential to win the war against CyberCrime and CyberTerrorismto win the war against CyberCrime and CyberTerrorism
  • 7. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity -- “Worldwide Internet Census 2012”“Worldwide Internet Census 2012” -- 7 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 8. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1) 8 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 9. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2) 9 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Link:Link: internetcensus2012.bitbucket.org/internetcensus2012.bitbucket.org/hilberthilbert//
  • 10. 10 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Worldwide Hyperbolic Map ofWorldwide Hyperbolic Map of Internet ConnectivityInternet Connectivity -- Link:Link: www.CAIDA.orgwww.CAIDA.org
  • 11. WorldwideWorldwide Hyperbolic ModelsHyperbolic Models of Internetof Internet 11 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Link:Link: www.CAIDA.orgwww.CAIDA.org :: CenterCenter for Applied Internet Data Analysisfor Applied Internet Data Analysis -- University of CaliforniaUniversity of California -- San Diego SupercomputerSan Diego Supercomputer CenterCenter --
  • 12. 11 ––““Cyber Crime, Cyber Terror & Cyber War”Cyber Crime, Cyber Terror & Cyber War” 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 12 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 – Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 – Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 8–From CyberVision to Business Reality! 9 –YOURYOUR Action Plan for 21stC Cyber!...
  • 13. “CyberVision:“CyberVision: 20172017 –– 2027”2027” •• My Vision:My Vision: My Personal “CyberVision”“CyberVision” develops practical scenarios for the next 10-15 Year Evolution of Cybersecurity •• World Transition:World Transition: From 2020ththC PhysicalC Physical to 2121ststC Cyber WorldC Cyber World •• AI Evolution:AI Evolution: Integrated, Adaptive & Intelligent SecurityIntegrated, Adaptive & Intelligent Security •• Marketplace:Marketplace: The Global CybersecuritCybersecurity Business Sector is forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025 13 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference forecast to expand to more than $250Billion/Yr by 2025$250Billion/Yr by 2025 •• CybersecurityCybersecurity is at the Core of 21stC Society: Pro-Active Real-Time Defence against Worldwide 24/7 Threats from *** Cyber Crime, Cyber Terrorism & Cyber Warfare ***Cyber Crime, Cyber Terrorism & Cyber Warfare *** ... We need to fully embed Intelligent & AdaptiveWe need to fully embed Intelligent & Adaptive Cybersecurity within theCybersecurity within the “Internet of Things”“Internet of Things”
  • 14. CyberCyber Crime,Crime, CyberCyber Terror &Terror & CyberCyber WarWar!! •• 2121ststCC CyberCyber Security:Security: New security threats & attacks hit our media screens EVERY Day! •• HybridHybrid CyberCyber--Physical:Physical: The “Bad Guys” now exploit hybrid weapons with hybrid cyber- physical attacks on critical info infrastructure 14 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• 25 Year25 Year CyberCyber Vision:Vision: Business & Government need to Urgently deploy New Generation AI/ML Security Solutions to “Win”“Win” the “War”“War” OurOur “Cyber“CyberVisionVision”” provides the basis for designing practical Strategies, Action Plansprovides the basis for designing practical Strategies, Action Plans and Roadmaps to combatand Roadmaps to combat CyberCyberCrime,Crime, CyberCyberTerrorTerror && CyberCyberWarWar forfor YOURYOUR Business!Business!
  • 15. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 15 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 16. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 16 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 17. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 17 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 18. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 18 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 19. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- Red Alert!Red Alert! 19 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! --
  • 20. 1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne 20 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference £1.9bn Cybercrime Budget£1.9bn Cybercrime Budget UK National Cyber CentreUK National Cyber Centre National Cyber Crime UnitNational Cyber Crime Unit
  • 21. “CyberWar”“CyberWar” Strategies & Models fromStrategies & Models from Classic WorksClassic Works!! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor CybersecurityCybersecurity RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor CybersecurityCybersecurity 21 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C! CybersecurityCybersecurity Specialists!Specialists! CybersecurityCybersecurity Specialists!Specialists!
  • 22. “CyberWar”“CyberWar” Strategies & Models fromStrategies & Models from Classic WorksClassic Works!! 22 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!Classic Works onClassic Works on “War”“War” are as relevant today forare as relevant today for CybersecurityCybersecurity as Preas Pre--2121ststC!C!
  • 23. 1 – Cyber Crime, Cyber Terror & Cyber War 22 –– CyberVision:CyberVision: 2121ststC Players & Threats!C Players & Threats! 3 – CyberSecurity: 21stC Radical Innovation 4 –Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 23 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 –Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 –Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 24. CyberVision:CyberVision: “21“21ststC Players & Threats”C Players & Threats” •• Cyber Criminals:Cyber Criminals: Seeking commercial gain from hacking banks & financial institutions as well as phishing scams through Email, Social Media & Encryption Ransom WareRansom Ware. •• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical business assets, and national infrastructurenational infrastructure for aims relating to “political power”, “shock” & “terror branding”. •• Cyber Espionage:Cyber Espionage: Using stealthy IT “Malware & Bots”Malware & Bots” to penetrate both corporate & military data servers in order 24 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Cyber Espionage:Cyber Espionage: Using stealthy IT “Malware & Bots”Malware & Bots” to penetrate both corporate & military data servers in order to obtain plans & intelligence. •• Cyber Hacktivists:Cyber Hacktivists: Groups such as “Anonymous”“Anonymous” with Political Agendas that hack sites & servers to virally communicate the “message” for specific campaigns. ......ALLALL thesethese “Bad Guys”“Bad Guys” have access to IT/Computing Professionals , and launchhave access to IT/Computing Professionals , and launch attacks withattacks with “Intelligent Bots”“Intelligent Bots”, “, “SelfSelf--modifying Malware”modifying Malware” && Cyber Tools KitsCyber Tools Kits
  • 25. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19971997--20172017 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 25 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security RisksHigh Security Risks:: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
  • 26. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 20 Year20 Year Evolution of Cyber Crime & Cyber Terror:Evolution of Cyber Crime & Cyber Terror: 19971997--20172017 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 26 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security RisksHigh Security Risks:: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning! Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
  • 27. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 33 –– CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios 4 –Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 27 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 –Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 –Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 28. CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios •• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to allow theft or corruption of Cyber Information / IT Data Bases , Personal ID / Financial Data and Confidential Company Plans •• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls & IT Databases to allow Criminals/Terrorists to enter Target Facilities (such as Banking/Finance, Telco/Mobile Operations) •• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the 28 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the weakest links which in the 21stC will be BOTHBOTH Cyber Network Operations, Physical Security Operations & Internet of Things! .......Cyber AttacksCyber Attacks are now fully industrialised with Malicious Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKWEBDARKWEB
  • 29. GlobalGlobal “Real“Real--Time”Time” DarkWebDarkWeb CyberAttacksCyberAttacks 29 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation 2020thth June 2014 :June 2014 : GlobalGlobal CyberAttacksCyberAttacks @@ “Speed of Light”“Speed of Light”
  • 30. Typical C2Typical C2 MalwareMalware SignaturesSignatures 30 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference SignaturesSignatures Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 31. 20172017--2027:2027: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 31 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 32. WWWW Internet ConnectionsInternet Connections –– IPv4 & IPv6IPv4 & IPv6 32 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 33. CybersecurityCybersecurity Market Size & GrowthMarket Size & Growth •• 2015:2015: Worldwide EstimatedWorldwide Estimated - $97$97 Billion •• 2020:2020: Worldwide ProjectedWorldwide Projected - $170$170 Billion –– North America:North America: - $64Bn – 10.0% CAGR (38%) –– Europe:Europe: - $39Bn – 7.2% CAGR (23%) –– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%) 33 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference –– AsiaAsia--Pacific:Pacific: - $38Bn –14.1% CAGR (22%) –– Middle East & Africa:Middle East & Africa: - $15Bn – 13.7% CAGR (9%) –– Latin America:Latin America: - $14Bn –17.6% CAGR (8%) (SourceSource: “Micro Market Monitor” & “Markets and Markets” – Estimated and Extrapolated from projections for 20142014 –– 20192019) •• 2025:2025: WorldwideWorldwide @ 10% CAGR - $275$275 Billion
  • 34. 34 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 2020: Hardware2020: Hardware Encrypted SystemsEncrypted Systems -- $252$252 BnBn -- 55%55% CAGR (Hard Disks, USB, Custom)CAGR (Hard Disks, USB, Custom) 2020 : Software2020 : Software Encrypted SystemsEncrypted Systems -- $6$6 BnBn –– 21%21% CAGR (Cloud, Mobile, Database)CAGR (Cloud, Mobile, Database) Source:Source: (1) Global Industry Analysts Inc (H/W)Global Industry Analysts Inc (H/W) –– (2) Markets and Markets (S/W)(2) Markets and Markets (S/W)
  • 35. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation 44 ––Scenario 2018Scenario 2018 –– CSO: CCSO: C--Suite IntegrationSuite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 –Scenario 2025 - AI & Machine Learning “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 35 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference35 44 ––Scenario 2018Scenario 2018 –– CSO: CCSO: C--Suite IntegrationSuite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 –Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 –In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 36. OurOur CyberVisionCyberVision:: 2017 to 20252017 to 2025 •• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged “Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO” •• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoT:IoT: DistributedDistributed 36 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• ScenarioScenario 20202020 –– Adaptive SecurityAdaptive Security--IoT:IoT: DistributedDistributed “Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things” •• ScenarioScenario 20252025 –– Intelligent Security:Intelligent Security: Transition toTransition to RealReal--TimeTime “AI/ML”“AI/ML” Cybersecurity Tools & SolutionsCybersecurity Tools & Solutions
  • 37. ScenarioScenario 20182018 –– CSO: CCSO: C--Suite IntegrationSuite Integration •• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security managed with minimal common operations •• 2121ststC CSO Model:C CSO Model: Business & Government urgently need to manage TOTAL Cyber-Physical Operations at C- Suite Board Level - “CSO“CSO -- Chief Security Officer!”Chief Security Officer!” 37 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Investment Plan:Investment Plan: CSOs need full Professional Teams & Investment Budget to manage both Physical & Cyber security risks, threats and attacks! ..........Corporate SecurityCorporate Security now requires Strategicnow requires Strategic Management, Budget @Management, Budget @ Board Director Level!Board Director Level!
  • 38. CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations •• CybersecurityCybersecurity for Government, Business & Critical Sectors can now be integrated with operational security solutions (PSIM&SIEMPSIM&SIEM) including: 1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities 2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Traffic & Parking 3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with CCTV & Alarm Control Centres 4)4) Personnel RFIDPersonnel RFID and BiometricsBiometrics for Office, Warehouse & Campus Access Controls 5) Professionally trained Security Personnel & GuardsSecurity Personnel & Guards – 24/7 – for top security facilities 6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors 38 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 6) Implemented facility Security PolicySecurity Policy for staff, visitors and contractors 7)7) Intelligent PerimeterIntelligent Perimeter security controls for campuses and critical service facilities such as airports, power stations, refineries, hospitals and government institutions 8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities 9) Focus upon in-depth Access ControlAccess Control for computer server rooms & data storage “Integrated Real“Integrated Real--TimeTime CyberCyber--PhysicalPhysical Security Operations”Security Operations” “SMART SECURITY”=“SMART SECURITY”=Cyber+PSIM+SIEMCyber+PSIM+SIEM
  • 39. Key Cybersecurity VenturesKey Cybersecurity Ventures -- USAUSA •• FireEyeFireEye –– Next Generation Security •• NorseNorse –– In-Depth Real-Time Intel •• CylanceCylance –– AI/ML Threat DetectionAI/ML Threat Detection •• DB NetworksDB Networks –– Real-Time ML Defence LanCopeLanCope –– Security Threat IntelligenceSecurity Threat Intelligence •• AlienVaultAlienVault –– Intelligent Security •• RSARSA –– Big Data & Cloud Security • Palantir –Analytics & Fraud • Daon – Biometics & ID Mgt • Akamai –Cloud & Mobile • Qualys – Cloud Security • Blue Coat – Business AssuranceBusiness Assurance • Arbor Networks – DDoS Attack • Zscaler – Security Services 39 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• RSARSA –– Big Data & Cloud Security •• VeraCodeVeraCode –– Secure Code Analytics •• Palo Alto NetworksPalo Alto Networks –– Next Gen Cyber •• Resilient SystemsResilient Systems –– Auto Threat Alert •• PrelertPrelert –– Machine Learning Solutions • Barracuda Networks – Firewalls+ • Zscaler – Security Services • Sonatype – Enterprise Security • Okta –Identity Management • Skybox Security –Risk Analytics • LogRhythm – Log Mgt Analytics • PKWare – Data Encryption USA/CanadaUSA/Canada is estimated to beis estimated to be 38% ($37Bn)38% ($37Bn) of Globalof Global CyberSecurityCyberSecurity MarketplaceMarketplace
  • 40. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 40 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference40 4 –Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 55 ––ScenarioScenario 20202020 –– Internet of Things(IoT)Internet of Things(IoT) ““Adaptive”Adaptive” 6 –Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 –In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 41. ScenarioScenario 2020:2020: “Internet of Things”“Internet of Things” •• CyberCyber--Enterprise:Enterprise: During the next 3-5 years of Cyber Evolution, the Internet will extend to practically ALL our IT enabled devices within Cars, Homes, Business, and CitiesCars, Homes, Business, and Cities! This is defined as the “Internet of Things - IoT” •• Extended Security:Extended Security: ALL IoT connected devices, nodes & servers (Legacy & NewLegacy & New) must be secured against attack! 41 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference servers (Legacy & NewLegacy & New) must be secured against attack! •• CSO Challenge:CSO Challenge: The IoT is alreadyalready the next 21stC Cyber Conflict Zone and Security Challenge for Enterprise CSOs! .... CyberCyber DDoSDDoS AttacksAttacks (MiraiMirai BotNetBotNet on DYN Incon DYN Inc) during Sept/Oct 2016 demonstrate the VulnerabilityVulnerability of “IoT”
  • 42. Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution 42 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 43. EUEU “IoT”“IoT” Programme Visions forProgramme Visions for “NOW”“NOW” && 20202020 43 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 44. CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT” 44 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 45. CyberCyber 20202020 Visions:Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton and The Australian Government (Defence)and The Australian Government (Defence) 45 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 46. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 46 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 – Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 66 –– Scenario 2025Scenario 2025 –– AI & Machine LearningAI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 47. ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security” • Transition & Full Deployment of Enterprise-Wide AI/ML-based IntelligentIntelligent “CyberSecurity” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to 47 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to augment Classic Detection using “Known Bad”,“Known Bad”, and hence provide New Generation “Defence In“Defence In--Depth”Depth” • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both Traditional & Advanced AI/ML “Cybersecurity Tools”
  • 48. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can 48 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can mitigate risks of new malware that have no prior “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 49. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm 49 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 50. Technology Visions:Technology Visions: ScenarioScenario 20252025 50 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
  • 51. CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios *** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon *** 51 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 52. TowardsTowards 20252025 :: ““Smart Security Solutions”Smart Security Solutions” • The Application of Artificial Intelligence and Machine Learning allows us to develop “Smart Security Solutions”“Smart Security Solutions” as follows: ……..……..”Smart Security Solutions””Smart Security Solutions” typically possess the following features:typically possess the following features: 1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks 2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 52 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale in space & time from micro cells to macro solutions 6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from Global Social Networks, Search & On-Line Trade & Commerce 7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations ………Now we’ll consider how………Now we’ll consider how ““AI & Machine Learning”AI & Machine Learning” principles are being engineered intobeing engineered into 2121ststC Cybersecurity Solutions & Services...C Cybersecurity Solutions & Services...
  • 53. Building ourBuilding our 20252025 Smart SecuritySmart Security ToolkitToolkit (1) Smart(1) Smart DecisionDecision PrinciplesPrinciples -- “D“D--Genes”Genes” •• Business DecisionsBusiness Decisions require focusing & filtering of Big Data sources in Space-Time to create local knowledge (Data Mining). Hence a useful metaphor is the “Knowledge Lens”:“Knowledge Lens”: – Smart Decision “Genes”“Genes” = Space, Time and Information Focus – Conceptual ““Knowledge Lens”Knowledge Lens” can filter and focus information in “Space” from searching Big Data Sets to a Small focused Short-List 53 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference “Space” from searching Big Data Sets to a Small focused Short-List – The “Knowledge Lens”“Knowledge Lens” can focus information & present in real-time, possibly as an stream of multi-media news or market intelligence •• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle in the design of Smart SecuritySmart Security, Smart Business & Smart Governance ....21stC....21stC Cyber AttacksCyber Attacks occur in Realoccur in Real--TimeTime @Optical Speeds@Optical Speeds so ultra fast analysis, decisions and action is a must!so ultra fast analysis, decisions and action is a must!
  • 54. Building ourBuilding our 20252025 Smart SecuritySmart Security ToolkitToolkit (2) Smart(2) Smart LearningLearning PrinciplesPrinciples -- “L“L--Genes”Genes” •• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and Scalable Architecture. The Decision “Genes” are relatively traditional whilst these new Learning “Genes” lie at the heart of Smart Security. –– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems and communities which include the well known self- organisation of insect roles in communities such as ants & bees. –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from 54 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple mathematical rules, as in Conway’s “Game of Life”“Game of Life” –– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in complex chaotic behaviour as found in real world insect populations –– Scalable ArchitectureScalable Architecture is also an essential feature of plants & animal life & Mandelbrot’s theory of Fractal Curves provides vivid examples. .....Current Trends:.....Current Trends: Research into AI, Machine Learning, Self-Organisation & Adaptation remains highly active in both Universities & Commercial R&D Labs
  • 55. HybridHybrid 2121ststC Business OrganisationC Business Organisation -- Hierarchical & OrganicHierarchical & Organic -- •• TransitionTransition from 20thC to 21stC Business, Governance & Security requires fundamental re-structuring of operations: –– 2020ththC Industrial Organisations:C Industrial Organisations: Hierarchical Bureaucracies - ”Pyramids””Pyramids” - to manually process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: Networked Peer-to-Peer Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds” 55 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Business & Agencies with data processed in “Cyber Clouds”“Cyber Clouds” •• Living SystemsLiving Systems, such as Mammals, use Hybrid Organisation of their extended nervous system (Brain & BodyBrain & Body) to optimise real- time learning and effective environmental adaptation! •• Smart Security SolutionsSmart Security Solutions will also require HybridHybrid organisation to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks. ScenarioScenario 20252025 Business will evolve to “Smart”Business will evolve to “Smart” ––HybridHybrid–– Security Operations!Security Operations!
  • 56. 20252025 : Designing “: Designing “Smart Security”Smart Security” •• Smart Security SolutionsSmart Security Solutions all use combinations of these Basic ICT Learning & Decision “genes” shared with Intelligent Living Systems: 1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked) 2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time & Decision Focus 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 56 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 4)4) Smart Security Solutions and Services:Smart Security Solutions and Services: Integration of Decision and Learning “Genes”, within Secure & Resilient Systems Environment .....Using “.....Using “AI & Machine Learning”AI & Machine Learning”,, 2121ststC Cyber Ventures are nowC Cyber Ventures are now marketing “Smart”marketing “Smart” SelfSelf--Learning CybersecurityLearning Cybersecurity Tools to secureTools to secure Enterprises, Government & Critical Information InfrastructureEnterprises, Government & Critical Information Infrastructure!!
  • 57. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 57 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 58. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 58 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 59. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 59 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 60. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 60 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 61. ScenarioScenario 2040+2040+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 61 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 62. MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl” 62 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
  • 63. Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society” •• RealReal--Time Security Operations:Time Security Operations: – Secure and monitor every cyber asset and critical physical asset through IP Networking, RFID Tagging & communication of status to operations centre •• Augmented & Immersive Reality:Augmented & Immersive Reality: – Multimedia virtual world overlays on data from the real physical world, through head-up displays & other forms of embedded sensors & displays •• Bio Neural Metaphors:Bio Neural Metaphors: – Further developments of self-organising and autonomous systems for monitoring and responding to cyber alerts & attacks in real-time 63 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference monitoring and responding to cyber alerts & attacks in real-time •• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling: – Adaptive 3D computer modelling of physical buildings, campuses & cities, as well as dynamic models of extended enterprises networks. The aim is to visualise, model & respond to security alerts with greater speed & precision •• “Smart Security” Architectures:“Smart Security” Architectures: – Effective integrated security requires management through hybrid hierarchical and “peer-to-peer” organisational architectures. Living organic systems also exploit hybrid architectures for optimal command & control 63
  • 64. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 64 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Algorithmic Computer Trading using Real-Time Neural Nets & Statistical Maths Tools have been used for 20+ Years! .....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent realreal--time forecasts for Enterprise Cybersecurity Threats!time forecasts for Enterprise Cybersecurity Threats!
  • 65. BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040 65 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 66. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 66 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 67. ScenarioScenario 20402040: Cyber Defence:: Cyber Defence: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 67 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 68. ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society” 68 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures! 19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
  • 69. ScenarioScenario 20402040: “: “Neural Security & Society”Neural Security & Society” 69 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Lawnmower ManLawnmower Man ((19921992):): SciSci--Fi Neural Futures!Fi Neural Futures! 19921992 << --Review Past 24 yearsReview Past 24 years-->> 20162016 <<-- Explore Future 24 yearsExplore Future 24 years-->> 20402040
  • 70. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 70 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 – Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 – Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 77 –– InIn--Depth:Depth: Critical Sector ScenariosCritical Sector Scenarios 8 – From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 71. 7) Future Security Tools:7) Future Security Tools: ““Critical Sectors”Critical Sectors” • Adaptive & Intelligent Security Solutions are Crucial to the Defence of CriticalCritical National Infrastructure & OUROUR Cities: a)a) Power Stations:Power Stations: Particularly Nuclear Energy Sites b)b) Government Offices:Government Offices: Parliaments & Govt Ministries c)c) Oil/Gas/Chemical Facilities:Oil/Gas/Chemical Facilities: Risk of Fires/Explosions d)d) Airports/Metro/Trains:Airports/Metro/Trains: ALL Transport Transit Hubs 71 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference d)d) Airports/Metro/Trains:Airports/Metro/Trains: ALL Transport Transit Hubs e)e) Cultural/Sports :Cultural/Sports : Theatres, Olympics, World Cup f)f) Tourist Resorts & Sights:Tourist Resorts & Sights: High Economic Impact ...Physical Security is no longer an effective defence!......Physical Security is no longer an effective defence!... NowNow CrucialCrucial to Deploy & Integrateto Deploy & Integrate Cyber SolutionsCyber Solutions thatthat protect User Access, Data Bases & Trackprotect User Access, Data Bases & Track “Bad Guys”!“Bad Guys”!
  • 72. Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures 72 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 73. Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture 73 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 74. Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework 74 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 75. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation 4 – Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 – Scenario 2025 - AI & Machine Learning “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 75 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 – Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 – Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 88 –– From CyberVision to Business Reality!From CyberVision to Business Reality! 9 – YOUR TOP 10 Actions & RoadMap
  • 76. FromFrom CyberVisionCyberVision toto Business RealityBusiness Reality!! •• 2020ththCC -- Past Research:Past Research: Adaptive AI/ML algorithms have been researched since 1960s/1970s. Computer Network Architectures now support such intelligent solutions! •• 20172017 -- Present Vision:Present Vision: Start-Ups such as DarkTrace are now successfully marketing Intelligent Security Solutions •• 20252025 -- Future Reality:Future Reality: 76 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• 20252025 -- Future Reality:Future Reality: Most Businesses & Government will deploy AI/ML Security Solutions within 5 to 10 years. ALLALL Corporate & Government CSO’sCorporate & Government CSO’s will eventually need towill eventually need to upgrade toupgrade to IntelligentIntelligent RealReal--Time SecurityTime Security to defend againstto defend against Cyber Crime, Cyber Terrorism and Cyber War!Cyber Crime, Cyber Terrorism and Cyber War!
  • 77. -- ““Innovative”Innovative” CybersecurityCybersecurity VenturesVentures -- “AI & Machine Learning Solutions”“AI & Machine Learning Solutions” •• Darktrace (UK)Darktrace (UK) –– Enterprise Immune System – Real-Time Modelling of Traffic, Nodes & Users – AI/ML Bayesian Learning •• CylanceCylance (US)(US) –– Next Generation Anti-Virus and Enterprise APT •• Deep Instinct (Israel)Deep Instinct (Israel) – Real-Time APT Protection with AI/ML •• DB Networks (US)DB Networks (US) –– Real-Time Advanced Threat Database Analytics & Cybersecurity •• PrelertPrelert (US)(US) – Behavioural Analytics Platform for Detection of Database 77 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference •• PrelertPrelert (US)(US) – Behavioural Analytics Platform for Detection of Database Threats & Anomalies •• MinerEyeMinerEye (Israel)(Israel) –– “Self-Learning” Data Loss Prevention with In-Depth Intelligent Classification •• LightCyberLightCyber (US)(US) – AI/ML Behavioural Profiling & Attack Detection •• LogRhythmLogRhythm (US)(US) – “Machine Learning” Event Log Forensics NewNew Cyber VenturesCyber Ventures based onbased on AI/MLAI/ML algorithms are startingalgorithms are starting--up everyup every MonthMonth!!
  • 78. Cybersecurity VC Funding:Cybersecurity VC Funding: 20102010 -- 20142014 78 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Source:Source: CBInsightsCBInsights - www.cbinsights.com/blog/cybersecurity-startup-financing/ SummarySummary -- 2009/20142009/2014 -- $7.3Billion$7.3Billion VC InvestmentVC Investment in 1028+1028+ VenturesVentures
  • 79. Darktrace:Darktrace: Cyber Intelligence PlatformCyber Intelligence Platform 79 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 80. LogRhythmLogRhythm:: Machine Learning ForensicsMachine Learning Forensics 80 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference LogRhythm’sLogRhythm’s Security Intelligence PlatformSecurity Intelligence Platform
  • 81. Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling 81 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
  • 82. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 82 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
  • 83. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 83 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
  • 84. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – CyberVision: 21stC Players & Threats 3 – CyberSecurity: 21stC Radical Innovation 4 – Scenario 2018 - CSO: C-Suite Integration 5 –Scenario 2020 – Internet of Things(IoT) 6 – Scenario 2025 - AI & Machine Learning “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 84 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4 – Scenario 2018 - CSO: C-Suite Integration “Integrated”“Integrated” 5 –Scenario 2020 – Internet of Things(IoT) “Adaptive”“Adaptive” 6 – Scenario 2025 - AI & Machine Learning “Intelligent”“Intelligent” 7 – In-Depth: Critical Sector Scenarios“ 8 – From CyberVision to Business Reality! 99 –– YOURYOUR TOP 10 Actions & RoadMapTOP 10 Actions & RoadMap
  • 85. YOURYOUR TOPTOP 1010 Actions & RoadMapActions & RoadMap 1)1) Assign CSOAssign CSO –– Chief Security OfficerChief Security Officer1)1) Assign CSOAssign CSO –– Chief Security OfficerChief Security Officer withwith Strategic SecurityStrategic Security Action PlanAction Plan 2)2) ProfessionalProfessional CyberSecurity TrainingCyberSecurity Training to International Certificationto International Certification -- CISSPCISSP 3)3) Implement International SecurityImplement International Security Standards (ISO/IECStandards (ISO/IEC-- Biometrics)Biometrics) 4)4) Open Discussions with “Cyber”Open Discussions with “Cyber” 6)6) ICT: Hire Qualified Cybersecurity SystemsICT: Hire Qualified Cybersecurity Systems Technology, Software & Operations TeamTechnology, Software & Operations Team 7)7) Review Security Risks & Connectivity of ALLReview Security Risks & Connectivity of ALL Enterprise IP Legacy Assets & Devices (IoT)Enterprise IP Legacy Assets & Devices (IoT) 8)8) Design Practical MultiDesign Practical Multi--Year Roadmap forYear Roadmap for Strategic Operational Security IntegrationStrategic Operational Security Integration 9)9) Professional Association Membership forProfessional Association Membership for 85 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference 4)4) Open Discussions with “Cyber”Open Discussions with “Cyber” Vendors and Trial AI/ML ToolsVendors and Trial AI/ML Tools 5)5) Profile YOUR Security Staff andProfile YOUR Security Staff and Contractors for Possible RisksContractors for Possible Risks 9)9) Professional Association Membership forProfessional Association Membership for Team Networking & Skill BuildingTeam Networking & Skill Building -- IPSAIPSA 10)10) Cyber Legal ProtectionCyber Legal Protection –– CheckCheck YourYour LegacyLegacy Contracts for “Cyber Theft” Trading RisksContracts for “Cyber Theft” Trading Risks NowNow YOURYOUR Business will be Fully Fit to Defend againstBusiness will be Fully Fit to Defend against ““Smart” CyberSmart” Cyber--PhysicalPhysical Attacks!Attacks!
  • 86. MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG 86 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 87. “Real“Real--Time Security” @Time Security” @ “Light Speed”!“Light Speed”! Machine LearningMachine Learning Cybersecurity ToolsCybersecurity Tools Provide RealProvide Real--TimeTime “Light Speed”“Light Speed” 87 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference “Light Speed”“Light Speed” Defence againstDefence against Threats & Attacks!Threats & Attacks! “Frog Spirit shows the Ring of Dark Matter around the Sun” - 2002 - Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov --
  • 88. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 88 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 89. “CyberVision”:“CyberVision”: 2121ststC Business ArchitecturesC Business Architectures International EastInternational East--West Security Conference: RomeWest Security Conference: Rome “CyberVision”:“CyberVision”: 2121ststC Business ArchitecturesC Business Architectures International EastInternational East--West Security Conference: RomeWest Security Conference: Rome ThankThank--You!You!ThankThank--You!You! 89 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/
  • 90. EastEast--West Security ConferenceWest Security Conference –– Rome 2016Rome 2016 -- “Smart CyberSecurity”“Smart CyberSecurity” -- Slides (PDF)Slides (PDF) -- 90 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Download Link:Download Link: www.valentina.net/Rome2016/www.valentina.net/Rome2016/ Theme (1)Theme (1) ––“21“21ststC Smart Security”C Smart Security” Theme (2)Theme (2) ––“CyberVision: 2017“CyberVision: 2017--2027”2027”
  • 91. Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Rome2016/www.Valentina.net/Rome2016/ 91 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 92. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 92 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 93. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 93 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2017 Editions2017 Editions.
  • 94. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 94 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Download:Download: www.valentina.net/DigiTec2012/
  • 95. “CyberSecurity Vision”:“CyberSecurity Vision”: 20172017––2027 & Beyond!2027 & Beyond! 3434thth International EastInternational East--West Security Conference: Rome, ItalyWest Security Conference: Rome, Italy 95 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 96. *** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing *** SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres 96 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet... 15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes dieddied in Avalanchein Avalanche »»
  • 97. Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents 97 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference
  • 98. -- SecureSecure Navigation in theNavigation in the ““Southern Seas”Southern Seas” -- ““Captain James Horsburgh” (1762Captain James Horsburgh” (1762 –– 1836)1836) Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore Charting theCharting the “Southern Seas”“Southern Seas” --“The India Directory”(1809)“The India Directory”(1809) -- for “The East India Company”for “The East India Company” 1)1) Horsburgh Island:Horsburgh Island: CocosCocos/Keeling Is/Keeling Is 2)2) Horsburgh Lighthouse: SingaporeHorsburgh Lighthouse: Singapore 3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives 98 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Horsburgh AtollHorsburgh Atoll -- MaldivesMaldives -- Horsburgh IslandHorsburgh Island --CocosCocos/Keeling/Keeling-- Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives FromFrom “Smart Navigation”“Smart Navigation” toto “Smart Security”!“Smart Security”! Dedicated to Memory of Edward Michael Horsburgh (1923Dedicated to Memory of Edward Michael Horsburgh (1923––2013)2013)
  • 99. -- SecureSecure Navigation in theNavigation in the ““Southern Seas”Southern Seas” -- ““Captain James Horsburgh” (1762Captain James Horsburgh” (1762 –– 1836)1836) Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore Charting theCharting the “Southern Seas”“Southern Seas” --“The India Directory”(1809)“The India Directory”(1809) -- for “The East India Company”for “The East India Company” 1)1) Horsburgh Island:Horsburgh Island: CocosCocos/Keeling Is/Keeling Is 2)2) Horsburgh Lighthouse: SingaporeHorsburgh Lighthouse: Singapore 3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives 99 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Horsburgh AtollHorsburgh Atoll -- MaldivesMaldives -- Horsburgh IslandHorsburgh Island --CocosCocos/Keeling/Keeling-- Horsburgh Lighthouse:Horsburgh Lighthouse: SingaporeSingapore3)3) Horsburgh/Horsburgh/GoidhooGoidhoo Atoll: MaldivesAtoll: Maldives FromFrom “Smart Navigation”“Smart Navigation” toto “Smart Security”!“Smart Security”! Dedicated to Memory of Edward Michael Horsburgh (1923Dedicated to Memory of Edward Michael Horsburgh (1923––2013)2013)
  • 100. 100 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
  • 101. 101 CyberSecurity Vision: 2017CyberSecurity Vision: 2017 –– 2027 & Beyond2027 & Beyond “Integrated, Adaptive & Neural Security”“Integrated, Adaptive & Neural Security” - Rome, Italy – 21st-22nd November 2016 - © Dr David E. Probert : www.VAZA.com © 34th International East/West Security Conference Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility