SlideShare a Scribd company logo
1 of 35
Download to read offline
CYBERSECURITY 3.0
THE SINGLE MOST IMPORTANT
EVENT OF THIS CENTURY
The Massive Shift in Competition
That Has Gone Largely Unrecognized
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Speaker
T. Casey Fleming
Chairman and CEO
BlackOps Partners
Founder, IBM Cyber Division (early 1990’s)
Cybersecurity Professional of the Year (2016)
contact@blackopspartners.com
www.blackopspartners.com
Intelligence | Think Tank | Strategy | Cybersecurity | Unprecedented Risk
Washington
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
The Single Most Important Event of This Century
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
‘War’
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
‘We don’t know what we don’t know’
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
‘The modern battlefield is everywhere’
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
No rules.
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
CYBERSECURITY 3.0
‘Digitization Changed Everything’
¨ Audience: All
¤ All industries and sectors: senior leaders and boards
¤ All government and military senior leaders
¨ Cybersecurity 1.0 & 2.0: Reactive, ‘Fighting a Ghost’
¤ Current day: One-third of attacks are successful
¨ Cybersecurity 3.0: ‘Digitization Changed Everything’
¤ Digital Transformation, Big Data, AI, ML, Quantum, Cyber growth, etc.
¤ Explosive growth forecasted for technology and risk
¨ The Long Game is now in focus
¨ The Massive Shift in Competition That Has Gone Largely
Unrecognized
¨ Visibility into the Big Picture: Unprecedented Risk
¨ Focus: Adversarial strategy and ongoing intelligence
¨ Now provides ability to pivot to proactive approach
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
“The Problem Isn’t Cambridge Analytica: It’s Facebook”
Forbes, 03.19.2018
“If You Weren’t Already Worried About Russia, You Should Be Now”
CNN, 03.25.2018
“Investors Put Cybersecurity Top of the Business Threat List”
Security, 03.08.2018
“Cyberspace is the New Battlespace”
Homeland Security Newswire, 03.09.2018
“Xi Jinping says China Willing to Fight ‘Bloody Battle' to Regain
Rightful Place in the World, in Blistering Nationalist Speech”
The Telegraph, 03.20.2018
“U.S. Charges 9 Iranians in Huge Theft of Intellectual Property”
New York Times, 03.23.2018
Current Environment: March 2018
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Current Environment: July 2018
“FBI Director Wray: China is ‘Most Significant’ Threat to US”
“China is the Broadest, Most Challenging, Most Significant Threat We Face as a Country”
https://www.businessinsider.com/fbi-director-says-china-is-the-broadest-most-significant-threat-to-the-us-2018-7
“Chinese Unrestricted Warfare Targeting American Economy, National Security”
http://thehill.com/blogs/congress-blog/economy-budget/398838-chinese-unrestricted-warfare-targeting-american-economy
“China Fighting ‘Real War’ to Steal US Innovation”
https://www.theepochtimes.com/china-fighting-real-war-to-steal-us-innovation_2600736.html?utm_source=Epoch+Times+Newsletters&utm_campaign=5ff9459657-
EMAIL_CAMPAIGN_2018_07_25_11_37&utm_medium=email&utm_term=0_4fba358ecf-5ff9459657-238109141
“Report: China, Russia and Iran Ramp Up Economic Spying on US”
https://www.apnews.com/94edccaf1e184ec6805f2f5471d43760
“What Trump’s Trade War Is Really About”
https://www.bloomberg.com/view/articles/2018-07-06/what-trump-s-trade-war-is-really-about
“DHS head Nielsen forecasts 'hurricane' cyberattacks”
https://www.cnbc.com/2018/07/31/dhs-head-cat-5-cyber-hurricane-is-forecast-heres-what-were-doing-a.html?__source=sharebar|linkedin&par=sharebar
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Massive Shift in Global Competition
¨ Unveiled: The Long Game
¨ “Unprecedented Risk”
¨ The game changed
¨ No Rules
¨ “Unrestricted Warfare” or “Asymmetrical Hybrid Warfare”
¨ $5 trillion stolen each year - one-third of U.S. GDP
¨ Permanently replacing U.S. in global competition
¨ Theft and infiltration affecting every company, industry, sector
¨ Pervasive espionage and infiltration: cyber, physical, human
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
“Why Trump’s Tariffs on China are a Big Deal”
CNNMoney, 03.22.2018
“Steel vs Steal”
Accelerated theft of:
• Innovation
• Trade secrets
• Intellectual property
• R&D
• Revenue, profit, jobs, our future
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
The ‘New’ Era in Global Competition
Unprecedented Risk
Asymmetrical Warfare
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘UNPRECEDENTED RISK’
‘ASYMMETRICAL HYBRID WARFARE’
DEFINITION
• Non-military
• No rules
• “Live or Die”
• Plausible deniability
• Comprehensive weakening
• Ultimate goal: Complete takeover
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
“The greatest transfer of wealth in history”
General Keith Alexander (ret.)
Director, National Security Agency
Commander, U.S. Cyber Command
07.09.2012
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
• Chinese Communist Party (CCP)
• Russian Federal Security Service (FSB)
• North Korea
• Iran
• India
• The DarkNet
• Others
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘UNPRECEDENTED RISK’
OVERALL STRATEGY - ADVERSARIES
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Non-Military
• Economic Warfare
• Transaction Warfare
• Industrial Warfare
Trans-Military
• Drug Warfare
• Information Warfare
Military
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘UNPRECEDENTED RISK’
OVERALL STRATEGY - EXAMPLES
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Cyber Warfare acts as the key accelerator
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘UNPRECEDENTED RISK’
OVERALL STRATEGY
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Adversarial Strategy
Idealogical Warfare
Attack: Values, Morals, Perceptions
Stages of Subversion
1. Demoralize
2. Destabilize
3. Open Conflict
4. Intervention
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘UNPRECEDENTED RISK’
OVERALL STRATEGY
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Economic Warfare
Attack: Financial Stability
• Foreign investment
• Currency devaluation
• “Cooperation”: Research / Business / Academic
• Blanketed, systematic espionage
• “Nothing is as it seems”
THE ‘NEW’ GLOBAL COMPETITVE MODEL
‘ASYMMETRICAL HYBRID WARFARE’
OVERALL STRATEGY
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Unprecedented Risk
¨ Driving ever-increasing unprecedented corporate and
organizational risk (also government, military, academia)
¤ Financial, Reputational (Brand), Strategic, Operational,
Legal, Survival Risk: ALL Risk
¨ Cybersecurity acts as the key accelerator to all methods
of Unprecedented Risk (Asymmetrical Hybrid Warfare)
¨ Now top priority with CEO’s, Boards, and C-Levels
¨ Missing link: Adversarial intelligence and strategy
included in corporate and Cybersecurity strategy
¨ Historical blind faith in technology and products ignore
the critical importance of the Human Factor
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Pervasive Espionage and Infiltration
Strategy
Strategy
Strategy
Strategy
Unprecedented / Asymmetrical Risk
Cyber Warfare
Operational
Tactical
Information Technology
Unprecedented Risk, Asymmetrical Risk
and Cyber Warfare Focus
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Key Takeaways
¨ The game changed while we’re very busy fighting with obsolete strategy with
technology and cybersecurity tools that are highly fallible.
¨ Massive shift in global competition that has gone largely unnoticed
¨ Adversarial ‘Live and Die’ versus our ‘Win and Lose’
¨ Extreme pervasive espionage and infiltration
¨ Cybersecurity and Unprecedented Risk must be elevated to the strategy layer
(where our adversaries have had it all along)
¨ Pivot focus to the Human Factor (proactive), not just Technology (reactive)
¨ CEO’s, C-levels, and Boards must lead the charge
¨ Share this important intelligence briefing - authorized for public distribution
¨ For a copy of this presentation, Unprecedented Risk - Asymmetrical Hybrid
Warfare PDF, ‘connecting the dots’ media list
- Send an email to: contact@blackopspartners.com
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
¨ Now you know.
¨ Awareness and Decisive Action:
- Unprecedented Risk and AHW
¨ Guard your data and personal values
¨ Personal Cyber hygiene
¨ Contact your elected representatives
¨ Opportunity to shift: Now you know.
HOW WE MOVE FORWARD TOGETHER
IMMEDIATE TAKEAWAYS
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Actionable Steps
Actionable Steps
¨ Update corporate and Cyber strategies based on Adversarial
Intelligence and Unprecedented Risk
¤ Elevate to the Strategy layer
¨ Practice Unprecedented Risk methods - Wargames
¨ “New Era” Human Factor awareness with adversarial intel
¨ Classify data, limit network, and physical access
¨ Always use a trusted VPN
¨ Restrict your mobile banking
¨ Think and study before you click
¨ Use separate strong passwords
¨ Use multi-factor identification
¨ Cyber hygiene begins with you and your family
¤ Cyber is now a key part of your daily life
¨ Remain alert and knowledgeable
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
¨ Defensive response to the ‘new era’ in global competition
¨ Unprecedented risk is the strategy and ultimate threat being
leveled against every U.S. and most allied organizations
¨ Cybersecurity now resides at the strategy layer
¨ Cybersecurity is a key accelerator to Unprecedented Risk
¨ Cybersecurity must be based on ongoing adversarial intelligence
and adversarial strategies
¨ Every organization must practice ‘muscle memory’ of
Unprecedented Risk (Asymmetrical Hybrid Warfare)
¨ A cultural and policy change (including suppliers)
¨ Performs shift from posture to proactive posture
¨ Action required immediately
Summary: What is Cybersecurity 3.0?
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
Resources
Cybersecurity 3.0 Is the Single Most Important Event of This Century
https://www.blackopspartners.com/cybersecurity-3-0-is-the-single-most-important-event-of-this-century/
Connecting the Dots: Refer to ‘Company Page’ on LinkedIn
Use Follow Us: for ‘up to date posts’
https://www.linkedin.com/company/blackops-partners-corporation/
Unprecedented Risk | Asymmetrical Hybrid Warfare
https://www.blackopspartners.com/resources/
Army Cyber Institute: “The Secret War Against the United States”
https://www.blackopspartners.com/wp-content/uploads/2017/11/BLACKOPS_CDR_SecretWar.pdf
TED Talk: “On the Front Lines of a War You Don’t Know About”
https://www.linkedin.com/slink?code=e2jricq
Rand Corporation: “Stretching and Exploiting Thresholds for High-Order War”
“How Russia, China, and Iran Are Eroding American Influence Using Time-Tested Measures Short of War”
https://www.rand.org/pubs/research_reports/RR1003.html
Has China Been Duping the US? Dr. Michael Pillsbury Discusses Tactical Efforts
https://www.blackopspartners.com/has-china-been-duping-the-us/
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
‘New Era’ Strategy-Based Adversarial Intelligence:
¨ C-level and Board briefings
¤ Risk, strategy, security, intelligence, cyber, unprecedented risk
¨ Enhanced Wargame exercises
¨ ‘New Era’ Security model and Cybersecurity 3.0 transformation
¤ Risk model transformation
¤ Security awareness training
¤ Data breach - tabletop exercises
¤ Risk assessments: security, cyber, organizational, C-Level, Board, IT,
supply chain, M&A
¨ Custom engagements
Capabilities
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
CYBERSECURITY 3.0
THE SINGLE MOST IMPORTANT
EVENT OF THIS CENTURY
The Massive Shift in Competition
That Has Gone Largely Unrecognized
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018

More Related Content

Similar to CYBERSECURITY 3.0: The Single Most Important Event of this Century

Why Big Data Needs Ethnography
Why Big Data Needs EthnographyWhy Big Data Needs Ethnography
Why Big Data Needs EthnographyMatt Artz
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
 
Cloud Ramps Up at DOD--Here's What You Need to Know
Cloud Ramps Up at DOD--Here's What You Need to KnowCloud Ramps Up at DOD--Here's What You Need to Know
Cloud Ramps Up at DOD--Here's What You Need to KnowimmixGroup
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpimmixGroup
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesDATAVERSITY
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresDATAVERSITY
 
2018 PMX Agency Summit: Redefining the Media Landscape
2018 PMX Agency Summit: Redefining the Media Landscape2018 PMX Agency Summit: Redefining the Media Landscape
2018 PMX Agency Summit: Redefining the Media LandscapePMX Agency
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...Bomgar
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresDATAVERSITY
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE - ATT&CKcon
 
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018Dara Albright
 
Lastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline, Inc.
 
See You in the Future
See You in the FutureSee You in the Future
See You in the Futureaccenture
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 
Understanding How Digital Finance Will Impact the Investment Landscape
Understanding How Digital Finance Will Impact the Investment LandscapeUnderstanding How Digital Finance Will Impact the Investment Landscape
Understanding How Digital Finance Will Impact the Investment LandscapeDara Albright
 

Similar to CYBERSECURITY 3.0: The Single Most Important Event of this Century (20)

Why Big Data Needs Ethnography
Why Big Data Needs EthnographyWhy Big Data Needs Ethnography
Why Big Data Needs Ethnography
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
Cloud Ramps Up at DOD--Here's What You Need to Know
Cloud Ramps Up at DOD--Here's What You Need to KnowCloud Ramps Up at DOD--Here's What You Need to Know
Cloud Ramps Up at DOD--Here's What You Need to Know
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can Help
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance Guidelines
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
 
2018 PMX Agency Summit: Redefining the Media Landscape
2018 PMX Agency Summit: Redefining the Media Landscape2018 PMX Agency Summit: Redefining the Media Landscape
2018 PMX Agency Summit: Redefining the Media Landscape
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018
Innovations driving the Mass Adoption of CryptoFinance ATL Nov 29 2018
 
Lastline RSAC 2018 Highlights
Lastline RSAC 2018 HighlightsLastline RSAC 2018 Highlights
Lastline RSAC 2018 Highlights
 
See You in the Future
See You in the FutureSee You in the Future
See You in the Future
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Understanding How Digital Finance Will Impact the Investment Landscape
Understanding How Digital Finance Will Impact the Investment LandscapeUnderstanding How Digital Finance Will Impact the Investment Landscape
Understanding How Digital Finance Will Impact the Investment Landscape
 

Recently uploaded

Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...afaqsaeed463
 

Recently uploaded (17)

Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...
 

CYBERSECURITY 3.0: The Single Most Important Event of this Century

  • 1. CYBERSECURITY 3.0 THE SINGLE MOST IMPORTANT EVENT OF THIS CENTURY The Massive Shift in Competition That Has Gone Largely Unrecognized BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018 BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 2. Speaker T. Casey Fleming Chairman and CEO BlackOps Partners Founder, IBM Cyber Division (early 1990’s) Cybersecurity Professional of the Year (2016) contact@blackopspartners.com www.blackopspartners.com Intelligence | Think Tank | Strategy | Cybersecurity | Unprecedented Risk Washington BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 3. The Single Most Important Event of This Century BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 4. ‘War’ BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 5. ‘We don’t know what we don’t know’ BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 6. ‘The modern battlefield is everywhere’ BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 7. No rules. BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 8. CYBERSECURITY 3.0 ‘Digitization Changed Everything’ ¨ Audience: All ¤ All industries and sectors: senior leaders and boards ¤ All government and military senior leaders ¨ Cybersecurity 1.0 & 2.0: Reactive, ‘Fighting a Ghost’ ¤ Current day: One-third of attacks are successful ¨ Cybersecurity 3.0: ‘Digitization Changed Everything’ ¤ Digital Transformation, Big Data, AI, ML, Quantum, Cyber growth, etc. ¤ Explosive growth forecasted for technology and risk ¨ The Long Game is now in focus ¨ The Massive Shift in Competition That Has Gone Largely Unrecognized ¨ Visibility into the Big Picture: Unprecedented Risk ¨ Focus: Adversarial strategy and ongoing intelligence ¨ Now provides ability to pivot to proactive approach BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 9. “The Problem Isn’t Cambridge Analytica: It’s Facebook” Forbes, 03.19.2018 “If You Weren’t Already Worried About Russia, You Should Be Now” CNN, 03.25.2018 “Investors Put Cybersecurity Top of the Business Threat List” Security, 03.08.2018 “Cyberspace is the New Battlespace” Homeland Security Newswire, 03.09.2018 “Xi Jinping says China Willing to Fight ‘Bloody Battle' to Regain Rightful Place in the World, in Blistering Nationalist Speech” The Telegraph, 03.20.2018 “U.S. Charges 9 Iranians in Huge Theft of Intellectual Property” New York Times, 03.23.2018 Current Environment: March 2018 BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 10. Current Environment: July 2018 “FBI Director Wray: China is ‘Most Significant’ Threat to US” “China is the Broadest, Most Challenging, Most Significant Threat We Face as a Country” https://www.businessinsider.com/fbi-director-says-china-is-the-broadest-most-significant-threat-to-the-us-2018-7 “Chinese Unrestricted Warfare Targeting American Economy, National Security” http://thehill.com/blogs/congress-blog/economy-budget/398838-chinese-unrestricted-warfare-targeting-american-economy “China Fighting ‘Real War’ to Steal US Innovation” https://www.theepochtimes.com/china-fighting-real-war-to-steal-us-innovation_2600736.html?utm_source=Epoch+Times+Newsletters&utm_campaign=5ff9459657- EMAIL_CAMPAIGN_2018_07_25_11_37&utm_medium=email&utm_term=0_4fba358ecf-5ff9459657-238109141 “Report: China, Russia and Iran Ramp Up Economic Spying on US” https://www.apnews.com/94edccaf1e184ec6805f2f5471d43760 “What Trump’s Trade War Is Really About” https://www.bloomberg.com/view/articles/2018-07-06/what-trump-s-trade-war-is-really-about “DHS head Nielsen forecasts 'hurricane' cyberattacks” https://www.cnbc.com/2018/07/31/dhs-head-cat-5-cyber-hurricane-is-forecast-heres-what-were-doing-a.html?__source=sharebar|linkedin&par=sharebar BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 11. Massive Shift in Global Competition ¨ Unveiled: The Long Game ¨ “Unprecedented Risk” ¨ The game changed ¨ No Rules ¨ “Unrestricted Warfare” or “Asymmetrical Hybrid Warfare” ¨ $5 trillion stolen each year - one-third of U.S. GDP ¨ Permanently replacing U.S. in global competition ¨ Theft and infiltration affecting every company, industry, sector ¨ Pervasive espionage and infiltration: cyber, physical, human BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 12. “Why Trump’s Tariffs on China are a Big Deal” CNNMoney, 03.22.2018 “Steel vs Steal” Accelerated theft of: • Innovation • Trade secrets • Intellectual property • R&D • Revenue, profit, jobs, our future BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 13. The ‘New’ Era in Global Competition Unprecedented Risk Asymmetrical Warfare BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 14. THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘UNPRECEDENTED RISK’ ‘ASYMMETRICAL HYBRID WARFARE’ DEFINITION • Non-military • No rules • “Live or Die” • Plausible deniability • Comprehensive weakening • Ultimate goal: Complete takeover BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 15. “The greatest transfer of wealth in history” General Keith Alexander (ret.) Director, National Security Agency Commander, U.S. Cyber Command 07.09.2012 BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 16. • Chinese Communist Party (CCP) • Russian Federal Security Service (FSB) • North Korea • Iran • India • The DarkNet • Others THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘UNPRECEDENTED RISK’ OVERALL STRATEGY - ADVERSARIES BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 17. Non-Military • Economic Warfare • Transaction Warfare • Industrial Warfare Trans-Military • Drug Warfare • Information Warfare Military THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘UNPRECEDENTED RISK’ OVERALL STRATEGY - EXAMPLES BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 18. Cyber Warfare acts as the key accelerator THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘UNPRECEDENTED RISK’ OVERALL STRATEGY BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 20. Idealogical Warfare Attack: Values, Morals, Perceptions Stages of Subversion 1. Demoralize 2. Destabilize 3. Open Conflict 4. Intervention THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘UNPRECEDENTED RISK’ OVERALL STRATEGY BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 21. Economic Warfare Attack: Financial Stability • Foreign investment • Currency devaluation • “Cooperation”: Research / Business / Academic • Blanketed, systematic espionage • “Nothing is as it seems” THE ‘NEW’ GLOBAL COMPETITVE MODEL ‘ASYMMETRICAL HYBRID WARFARE’ OVERALL STRATEGY BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 22. Unprecedented Risk ¨ Driving ever-increasing unprecedented corporate and organizational risk (also government, military, academia) ¤ Financial, Reputational (Brand), Strategic, Operational, Legal, Survival Risk: ALL Risk ¨ Cybersecurity acts as the key accelerator to all methods of Unprecedented Risk (Asymmetrical Hybrid Warfare) ¨ Now top priority with CEO’s, Boards, and C-Levels ¨ Missing link: Adversarial intelligence and strategy included in corporate and Cybersecurity strategy ¨ Historical blind faith in technology and products ignore the critical importance of the Human Factor BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 23. Pervasive Espionage and Infiltration
  • 26. Strategy Strategy Unprecedented / Asymmetrical Risk Cyber Warfare Operational Tactical Information Technology Unprecedented Risk, Asymmetrical Risk and Cyber Warfare Focus BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 27. Key Takeaways ¨ The game changed while we’re very busy fighting with obsolete strategy with technology and cybersecurity tools that are highly fallible. ¨ Massive shift in global competition that has gone largely unnoticed ¨ Adversarial ‘Live and Die’ versus our ‘Win and Lose’ ¨ Extreme pervasive espionage and infiltration ¨ Cybersecurity and Unprecedented Risk must be elevated to the strategy layer (where our adversaries have had it all along) ¨ Pivot focus to the Human Factor (proactive), not just Technology (reactive) ¨ CEO’s, C-levels, and Boards must lead the charge ¨ Share this important intelligence briefing - authorized for public distribution ¨ For a copy of this presentation, Unprecedented Risk - Asymmetrical Hybrid Warfare PDF, ‘connecting the dots’ media list - Send an email to: contact@blackopspartners.com BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 28. ¨ Now you know. ¨ Awareness and Decisive Action: - Unprecedented Risk and AHW ¨ Guard your data and personal values ¨ Personal Cyber hygiene ¨ Contact your elected representatives ¨ Opportunity to shift: Now you know. HOW WE MOVE FORWARD TOGETHER IMMEDIATE TAKEAWAYS BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 30. Actionable Steps ¨ Update corporate and Cyber strategies based on Adversarial Intelligence and Unprecedented Risk ¤ Elevate to the Strategy layer ¨ Practice Unprecedented Risk methods - Wargames ¨ “New Era” Human Factor awareness with adversarial intel ¨ Classify data, limit network, and physical access ¨ Always use a trusted VPN ¨ Restrict your mobile banking ¨ Think and study before you click ¨ Use separate strong passwords ¨ Use multi-factor identification ¨ Cyber hygiene begins with you and your family ¤ Cyber is now a key part of your daily life ¨ Remain alert and knowledgeable BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 31. ¨ Defensive response to the ‘new era’ in global competition ¨ Unprecedented risk is the strategy and ultimate threat being leveled against every U.S. and most allied organizations ¨ Cybersecurity now resides at the strategy layer ¨ Cybersecurity is a key accelerator to Unprecedented Risk ¨ Cybersecurity must be based on ongoing adversarial intelligence and adversarial strategies ¨ Every organization must practice ‘muscle memory’ of Unprecedented Risk (Asymmetrical Hybrid Warfare) ¨ A cultural and policy change (including suppliers) ¨ Performs shift from posture to proactive posture ¨ Action required immediately Summary: What is Cybersecurity 3.0? BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 32. Resources Cybersecurity 3.0 Is the Single Most Important Event of This Century https://www.blackopspartners.com/cybersecurity-3-0-is-the-single-most-important-event-of-this-century/ Connecting the Dots: Refer to ‘Company Page’ on LinkedIn Use Follow Us: for ‘up to date posts’ https://www.linkedin.com/company/blackops-partners-corporation/ Unprecedented Risk | Asymmetrical Hybrid Warfare https://www.blackopspartners.com/resources/ Army Cyber Institute: “The Secret War Against the United States” https://www.blackopspartners.com/wp-content/uploads/2017/11/BLACKOPS_CDR_SecretWar.pdf TED Talk: “On the Front Lines of a War You Don’t Know About” https://www.linkedin.com/slink?code=e2jricq Rand Corporation: “Stretching and Exploiting Thresholds for High-Order War” “How Russia, China, and Iran Are Eroding American Influence Using Time-Tested Measures Short of War” https://www.rand.org/pubs/research_reports/RR1003.html Has China Been Duping the US? Dr. Michael Pillsbury Discusses Tactical Efforts https://www.blackopspartners.com/has-china-been-duping-the-us/ BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 33. ‘New Era’ Strategy-Based Adversarial Intelligence: ¨ C-level and Board briefings ¤ Risk, strategy, security, intelligence, cyber, unprecedented risk ¨ Enhanced Wargame exercises ¨ ‘New Era’ Security model and Cybersecurity 3.0 transformation ¤ Risk model transformation ¤ Security awareness training ¤ Data breach - tabletop exercises ¤ Risk assessments: security, cyber, organizational, C-Level, Board, IT, supply chain, M&A ¨ Custom engagements Capabilities BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018
  • 34.
  • 35. CYBERSECURITY 3.0 THE SINGLE MOST IMPORTANT EVENT OF THIS CENTURY The Massive Shift in Competition That Has Gone Largely Unrecognized BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018 BLACKOPS PARTNERS CORPORATION - PROPRIETARY - COPYRIGHT © 2018