Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Finland, a cyber threat preparedness forerunner?

996 Aufrufe

Veröffentlicht am

A presentation given in the Teknologia´15 conference session on cyber security.

Veröffentlicht in: Präsentationen & Vorträge
  • Als Erste(r) kommentieren

Finland, a cyber threat preparedness forerunner?

  1. 1. Finland, a cyber threat preparedness forerunner? Jyrki J.J. Kasvi Parliament of Finland TIEKE Finnish Information Society Centre @jyrkikasvi
  2. 2. Cyber threats are old news In 1982, CIA allegedly tampered with the software Soviet Union covertly purchased from Canada to control their Trans-Siberian gas pipeline. When put to use, the system allegedly produced intense pressure in the pipeline, resulting in the largest man-made non-nuclear explosion in history. Public Domain U.S. Air Force
  3. 3. Digital and physical used to be separate Digital Physical
  4. 4. Then cyber connected them Digital PhysicalCyber
  5. 5. Now cyber introduces digital threats to physical world Digital Physical Cyber IoT Threats
  6. 6. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 6 Modern cars include more than 85 controllers or mini-computers communicating both with each other and the outside world. In July 2015, researchers demonstrated how to control a Jeep Cherokee over the Internet. Chrysler had to recall 1.4 million vehicles to patch the vulnerability. We have been super lucky! CC Wired / Andy Greenberg
  7. 7. A multi disciplinary challenge  A global challenge: Data security of Internet connected automation systems has been demonstrated to be poor  E.g. in 2013, about 3000 Finnish industrial and real estate automation systems were found to lack proper access controls  With IoT, connected sensors and automation systems are going to become commonplace, requiring reliable and usable security  The same people responsible for our home wifi’s are going to install our connected home automation systems too  Cyber/IoT security requires a combination of data security, mobile technology, automation and usability competencies  A multi disciplinary approach is required. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 7
  8. 8. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 8
  9. 9. The global cyber challenge is a Finnish opportunity  Finnish data security cluster is very strong  SSH, F-Secure, Stonesoft, Blancco, Nixu, …  Finnish mobile technology cluster is still there  Especially mobile networks  Finnish automation and robotics cluster needs work  We are years behind competition  Finnish usability research is good but application poor  Our attitude towards end users definitely requires work  Public commitment and jurisdiction still weak  Minimalistic cyber threat monitoring and defence resources  Public authority jurisdictions not sufficient for the task at hand  Research and education requires bootstrapping 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 9
  10. 10. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 10 Combining strengths with weaknesses We need to rely on our strengths while we address our weaknesses in order to build a Finnish cyber security cluster from these parts. We need a cyber Commodore 64 to inspire our next generation.
  11. 11. 6.10.2015 TIEKE Tietoyhteiskunnan kehittämiskeskus ry 11
  12. 12. 30.9.2010 www.kasvi.org 12 Sukupuolten välinen digikuilu? Discussion U.S. Army Photo