21stC Cybersecurity Trends: 2018-2025 & Beyond!...

Dr David Probert
Dr David ProbertReal-Time Cybersecurity & Artificial Intelligence at VAZA International (Pro Bono)
••
2121ststCC CyberCyber Defence & TrendsDefence & Trends
........20182018 -- 20252025 && BeyondBeyond!....!....
1
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
........20182018 -- 20252025 && BeyondBeyond!....!....
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
ISSAISSA CyberSecurity ConferenceCyberSecurity Conference -- 20182018
Venue:Venue: HQS WellingtonHQS Wellington -- Thames, LondonThames, London
2
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
HMS Wellington (U65)HMS Wellington (U65): “Grimsby: “Grimsby--Class Sloop”Class Sloop” -- Launched Devonport 1934Launched Devonport 1934
Photo:Photo: Ship Moorings @ Thames EmbankmentShip Moorings @ Thames Embankment
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
3
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
Cyberspace CensusCyberspace Census -- 20122012
6
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Link:Link: census2012.sourceforge.net/census2012.sourceforge.net/hilberthilbert//
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1)
7
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2)
8
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3)
9
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4)
10
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Link:Link: census2012.sourceforge.net/census2012.sourceforge.net/hilberthilbert//
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
11
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace
12
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR“YOUR CyberCyber Defence”Defence”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
13
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
““CyberCyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
““NeuralNeural Security”Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea”@ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW“NEW CyberCyber Toolkit”Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR“YOUR CyberCyber Defence”Defence”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
14
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
““CyberCyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
““NeuralNeural Security”Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea”@ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW“NEW CyberCyber Toolkit”Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
15
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia
16
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
CybersecurityCybersecurity forfor thethe Georgian ParliamentGeorgian Parliament
17
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Critical Infrastructure Audit during UN Cybersecurity Mission: Georgian ParliamentCritical Infrastructure Audit during UN Cybersecurity Mission: Georgian Parliament
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
18
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
19
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
Securing Jamaica in Cyberspace!Securing Jamaica in Cyberspace! -- UN/ITU GuidelinesUN/ITU Guidelines
-- (1)(1) ––
Legal MeasuresLegal Measures -- (2)(2) ––
Technical &Technical &
ProceduralProcedural
--(3)(3) ––
OrganizationalOrganizational
-- (4)(4) –– CapacityCapacity BuildingBuilding
20
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
ProceduralProcedural
MeasuresMeasures
OrganizationalOrganizational
StructuresStructures
-- (5)(5) –– International CollaborationInternational Collaboration
Securing Jamaica in Cyberspace!Securing Jamaica in Cyberspace! -- UN/ITU GuidelinesUN/ITU Guidelines
-- (1)(1) ––
Legal MeasuresLegal Measures -- (2)(2) ––
Technical &Technical &
ProceduralProcedural
--(3)(3) ––
OrganizationalOrganizational
-- (4)(4) –– CapacityCapacity BuildingBuilding
** UN/ITUUN/ITU: Cybersecurity Training: Cybersecurity Training -- UTECH, JamaicaUTECH, Jamaica **
Government, Central Bank, EnergyGovernment, Central Bank, Energy & T& Telecoms Sectorselecoms Sectors
21
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
ProceduralProcedural
MeasuresMeasures
OrganizationalOrganizational
StructuresStructures
-- (5)(5) –– International CollaborationInternational Collaboration
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
22
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
23
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
24
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
25
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
26
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
27
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
“BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017
Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!...
28
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
*** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017
29
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...)
....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet
fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016
30
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such
asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!...
“Internet of Threats”!“Internet of Threats”!
CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016
31
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things)
HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange
- PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats
“Y“YOUR CyberOUR Cyber Defence”Defence”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
32
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea@ Sea””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
ThrustSSC – 1st Supersonic Car – October 1997
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats
“Y“YOUR CyberOUR Cyber Defence”Defence”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
22 –– TOP 10TOP 10 CyberCyber Attacks & Threats!Attacks & Threats!
“Y“YOUROUR CyberCyber Defence”Defence”
33
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea@ Sea””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Y“YOUROUR CyberCyber Defence”Defence”
ThrustSSC – 1st Supersonic Car – October 1997
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
34
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
Thrust SSCThrust SSC –– “Breaking the Sound Barrier”“Breaking the Sound Barrier” **
Mach ONEMach ONE -- 1228km/h1228km/h –– October 1997 *October 1997 *
35
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
BloodHoundBloodHound SSC 2017SSC 2017
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
36
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
1997 Thrust SSC1997 Thrust SSC
Mach ONEMach ONE
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220M Yrs220M Yrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence”
“Emergence of DNA/Genetic Code”“Emergence of DNA/Genetic Code”
37
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• 20032003-- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!...
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
“Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!.....)!.....
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220MYrs220MYrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
38
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• 20032003 -- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
2121ststC “Cyber” (C “Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!.....)!.....
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20182018 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
39
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20182018 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
40
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
41
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
42
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
43
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
44
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
45
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
46
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
“Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
47
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!...
...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815
48
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
““ClauzewitzClauzewitz”” is relevant tois relevant to Cyber Campaigns!Cyber Campaigns!
Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812
49
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns!
21stC21stC Cyber WarCyber War && Peace!Peace!
2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism”
DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds
INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER
Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY
“Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools
& Resources to extensively& Resources to extensively
ResearchResearch && LaunchLaunch MajorMajor
Physical Terror Attacks!Physical Terror Attacks!
50
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Physical Terror Attacks!Physical Terror Attacks!
(1)(1) DarkWebDarkWeb forfor Weapons!Weapons!
(2)(2) ResearchResearch Urban TargetsUrban Targets
(3)(3) Social MediaSocial Media forfor CommsComms
(4)(4) RecruitmentRecruitment & Training& Training
(5)(5) RansomwareRansomware for CAfor CA$$H..H..
Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!...
• Skills required by the “Bad Guys”“Bad Guys” to launch and
manage major Cyber Crime Campaigns:
•• ICT:ICT: Cyber Technical Specialist (Hacking Tools)
•• Finance:Finance: Money Laundering & Campaign Budget
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
51
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
•• Project Management:Project Management: Co-ordinate Campaign!
•• Security:Security: Detect “BackDoors” both in the Physical
and Cyber Defences of the Target Business/Govt
...In summary, the “Bad Guys”“Bad Guys” will often organise
themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkWebDarkWeb”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
52
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkWebDarkWeb”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
53
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber Defence”Defence”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
54
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @@ SeaSea””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
Ship: SS Kinsembo – Liverpool to Congo - 1885
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber Defence”Defence”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security“Integrated Security””
55
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @@ SeaSea””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Integrated Security“Integrated Security””
Ship: SS Kinsembo – Liverpool to Congo - 1885
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
56
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
57
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+
•• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged
“Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO”
•• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed
“Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things”
58
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to
“Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools
•• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity
based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
59
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
60
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance
61
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools
IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
62
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Dashboard!Dashboard!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
CSIM Example: “VIDSYS Inc - Enterprise 2018”
Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling
forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management”
63
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack
•• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce
YOUR Risks of Cyber Threats & Attacks...
–– Device & Access AuthenticationDevice & Access Authentication by Fingerprints,
Retinal/Iris Scan or Palm Vein Scan
–– Facility AccessFacility Access with “Live” 3D Facial Recognition
–– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
64
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
–– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
CCTV & Real-Time Self-Learning Video Analytics
–– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials –
(CChemical, BBiological, RRadiological, NNuclear)
...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated
with the CSO-led Business Security OperationsBusiness Security Operations
TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions
65
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions
66
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics
67
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans
68
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”!
69
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930
“Forensics Pioneer”“Forensics Pioneer”
a)a) Detective WorkDetective Work
b)b) FingerprintsFingerprints
c)c) Ciphers & CodesCiphers & Codes
d)d) FootprintsFootprints
e)e) HandwritingHandwriting
Forensics:Forensics: Fast DNA Finger PrintingFast DNA Finger Printing
70
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore
71
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CyberCyber--Bio:Bio: IntegratedIntegrated Security ScenariosSecurity Scenarios
•• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats
•• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft
•• Defence/Military:Defence/Military: Cyber-Espionage & Attacks
•• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs
•• Culture/Sports:Culture/Sports: Major Events & Competitions
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
72
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
•• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege
•• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records”
...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL
Our Business Sectors & Critical Infrastructure!
“Real“Real--Time”Time” City Video SurveillanceCity Video Surveillance
73
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
:: AI CyberAI Cyber--Bio SurveillanceBio Surveillance
74
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn”
www.sensetime.comwww.sensetime.com
:: AI CyberAI Cyber--Bio SurveillanceBio Surveillance
75
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn”
www.sensetime.comwww.sensetime.com
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber DefenceDefence””
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
76
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea”@ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
Ship: HMT Ascanius – Devonport to Durban - 1917
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber DefenceDefence””
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
77
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
““CyberCyber @ Sea”@ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Self“Self--Adaptive Security”Adaptive Security”
Ship: HMT Ascanius – Devonport to Durban - 1917
78
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Trip Diary Link :Trip Diary Link : www.valentina.net/PWP/www.valentina.net/PWP/
Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Adaptive Security****** Adaptive Security***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
79
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
80
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
20182018 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
81
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
82
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
EU/IERCEU/IERC –– Research Cluster Reports:Research Cluster Reports:
““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things
83
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
84
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
85
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
“Cyber @ Sea”“Cyber @ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
Whiskey Class Submarine S189 – St Petersburg
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
86
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
“OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
“Cyber @ Sea”“Cyber @ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning Security”Learning Security”
Whiskey Class Submarine S189 – St Petersburg
Whiskey ClassWhiskey Class –– Soviet Submarines (Project 613)Soviet Submarines (Project 613)
Proposed Barter Deal in 1992 for ITProposed Barter Deal in 1992 for IT Training CentreTraining Centre ((СПИИРАНСПИИРАН))
87
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
KolaNet ProjectKolaNet Project -- Nuclear Safety & SecurityNuclear Safety & Security :: RussiaRussia
88
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
KolaNet ProjectKolaNet Project -- Nuclear Safety & SecurityNuclear Safety & Security :: RussiaRussia
89
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
90
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
mitigate risks of new malware that have no prior “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
“Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018!
-- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! --
• 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts)
• 1948 – “Cybernetics” – Norbert Wiener
• 1969 – ARPANet Launched – 4 Packet Switching Net Nodes -
• 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn
• 1982 – Elk Cloner - 1st “Apple Computer Virus
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
91
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
• 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp)
• 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee
• 1993 – Mosaic Browser – NCSA – Illinois, USA
• 2018 –Transition to AI/ML Apps for 21stC CyberSecurity!
-- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
92
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
93
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
David ProbertDavid Probert
ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools”
*** Self*** Self--Learning Security ***Learning Security ***
• Major Trends and Developments: Scenario 2025Scenario 2025
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
94
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
95
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
96
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Smart 3D Network Cyber Simulation:Smart 3D Network Cyber Simulation: HyperglanceHyperglance
97
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
www.hyperglance.comwww.hyperglance.com
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
98
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
99
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
100
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
101
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
102
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
103
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
“Cyber @ Sea”“Cyber @ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent Security”Intelligent Security”
104
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
“Cyber @ Sea”“Cyber @ Sea”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Cyber“Cyber--Intelligent Security”Intelligent Security”
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
105
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
106
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security”
• Transition & Full Deployment of Enterprise-Wide
AI/ML-based IntelligentIntelligent “CyberSecurity” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of
Net Traffic, System/Event Logs, Net Nodes, Servers,
Databases, Devices & Users
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
107
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
augment Classic Detection using “Known Bad”,“Known Bad”, and
hence provide New Generation “Defence In“Defence In--Depth”Depth”
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both Traditional &
Advanced AI/ML “Cybersecurity Tools”
HybridHybrid 2121ststC Business OrganisationC Business Organisation
-- Hierarchical & NetworkedHierarchical & Networked --
•• TransitionTransition from 20thC to 21stC Business, Governance & Security
requires fundamental re-structuring of operations:
–– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies -
”Pyramids””Pyramids” - to manually process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
108
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
•• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of
their extended nervous system (Brain & BodyBrain & Body) to optimise real-time
learning and effective self-organising environmental adaptation!
•• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to
optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
109
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
110
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm
111
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
112
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
www.nvidia.comwww.nvidia.com
NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
113
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
114
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
115
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
116
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
117
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
www.deepinstinct.comwww.deepinstinct.com
SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled
“Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”...
118
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy
-- DistributedDistributed BlockChainBlockChain Payment NetPayment Net --
119
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy
-- DistributedDistributed BlockChainBlockChain Payment NetPayment Net --
120
“21stC CyberSecurity Defence & Trends”
**** From 2018 - 2025 & Beyond! ****
HQS Wellington, London, UK – 5th July 2018
© Dr David E. Probert : www.VAZA.com ©
ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
1 of 176

Recommended

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025! by
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
6.2K views120 slides
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit! by
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
2.1K views140 slides
YOUR Defence for the TOP 10 Cyber Threats! by
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!Dr David Probert
843 views100 slides
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 ! by
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
1.3K views112 slides
Artificial Intelligence and Machine Learning for Cybersecurity by
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
4.9K views92 slides
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure by
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
586 views97 slides

More Related Content

What's hot

CyberSecurity Vision: 2017-2027 & Beyond! by
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
2.9K views101 slides
Smart Security Architectures for YOUR Business! by
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
2.4K views109 slides
Cyber Threats & Defence! - "Intelligent CyberSecurity"! by
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
484 views112 slides
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! by
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!Dr David Probert
870 views134 slides
Cybersecurity for Critical National Infrastructure by
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
742 views115 slides
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling by
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
1.1K views126 slides

What's hot(20)

CyberSecurity Vision: 2017-2027 & Beyond! by Dr David Probert
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
Dr David Probert2.9K views
Smart Security Architectures for YOUR Business! by Dr David Probert
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
Dr David Probert2.4K views
Cyber Threats & Defence! - "Intelligent CyberSecurity"! by Dr David Probert
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Dr David Probert484 views
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! by Dr David Probert
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
Dr David Probert870 views
Cybersecurity for Critical National Infrastructure by Dr David Probert
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
Dr David Probert742 views
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling by Dr David Probert
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Dr David Probert1.1K views
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T... by Dr David Probert
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
Dr David Probert788 views
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics! by Dr David Probert
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Dr David Probert380 views
Integrated Cybersecurity and the Internet of Things by Dr David Probert
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
Dr David Probert2.8K views
Cybersecurity Technologies, Standards and Operations by Dr David Probert
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
Dr David Probert1.4K views
National Cybersecurity - Roadmap and Action Plan by Dr David Probert
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert4.2K views
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar! by Dr David Probert
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert1.7K views
CyberTerrorism - Security in Cyberspace by Dr David Probert
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
Dr David Probert1.8K views
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy by Dr David Probert
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert398 views
Cyber-Pandemic: Current Reality & Future Trends by Dr David Probert
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
Dr David Probert509 views
Integrated Physical and Cybersecurity for Governments and Business by Dr David Probert
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
Dr David Probert963 views
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain by Dr David Probert
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert402 views
UN/ITU - Organisational Structures and Incident Management - Cybersecurity by Dr David Probert
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
Dr David Probert3.2K views
Development of National Cybersecurity Strategy and Organisation by Dr David Probert
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
Dr David Probert2.6K views
2018 Cybersecurity Predictions by Nyotron
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
Nyotron1.3K views

Similar to 21stC Cybersecurity Trends: 2018-2025 & Beyond!...

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security! by
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
476 views111 slides
Cyberterrorism - Conflict in Cyberspace by
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
1.1K views57 slides
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security by
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
926 views40 slides
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le... by
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...Dr. Haxel Consult
443 views27 slides
cyber security | What Is Cyber Security | Hello World Session by
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World SessionYasserElsnbary
188 views48 slides
Cybersecurity for Critical National Information Infrastructure by
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
1.4K views79 slides

Similar to 21stC Cybersecurity Trends: 2018-2025 & Beyond!... (16)

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security! by Dr David Probert
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
Dr David Probert476 views
Cyberterrorism - Conflict in Cyberspace by Dr David Probert
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert1.1K views
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security by CableLabs
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
CableLabs926 views
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le... by Dr. Haxel Consult
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...
IC-SDV 2019: Case Study: “Silicon Valley Technology Insight” – What we can le...
Dr. Haxel Consult443 views
cyber security | What Is Cyber Security | Hello World Session by YasserElsnbary
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Session
YasserElsnbary188 views
Cybersecurity for Critical National Information Infrastructure by Dr David Probert
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert1.4K views
A Career in Cybersecurity – an Australian perspective; outlook, opportunities... by Ashwani Ram
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
Ashwani Ram110 views
AI & Cybersecurity meet 21stC GeoPolitics by Dr David Probert
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
Dr David Probert29 views
From the Arsenal of Democracy, to Democratizing Security by Dug Song
From the Arsenal of Democracy, to Democratizing SecurityFrom the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
Dug Song109 views
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation by Nine23Ltd
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Nine23Ltd377 views
Cybersecurity in the Age of the Everynet by Bill Harpley
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
Bill Harpley545 views
Data, Technology, and Innovation: Platform for Change by Cisco Canada
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for Change
Cisco Canada2.9K views
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012 by Dr David Probert
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Dr David Probert512 views
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet by Matthew Bailey
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our PlanetMatthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey585 views
The WISER Project at a glance by CYBERWISER .eu
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
CYBERWISER .eu181 views
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas by Jessica Tams
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
Jessica Tams250 views

More from Dr David Probert

From Hughesovka to Donetsk (Translated to Russian) by
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
75 views16 slides
19thC Hughesovka to 21stC Donetsk by
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
83 views13 slides
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks! by
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
259 views70 slides
Project KolaNet - Rethinking IT Support for the Environment by
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
463 views22 slides
Embedding Artificial Intelligence in the Enterprise by
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
1.1K views75 slides
Business BluePrint for Electronic Business by
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
411 views60 slides

More from Dr David Probert(7)

From Hughesovka to Donetsk (Translated to Russian) by Dr David Probert
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
Dr David Probert75 views
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks! by Dr David Probert
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
Dr David Probert259 views
Project KolaNet - Rethinking IT Support for the Environment by Dr David Probert
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
Dr David Probert463 views
Embedding Artificial Intelligence in the Enterprise by Dr David Probert
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
Dr David Probert1.1K views
Business BluePrint for Electronic Business by Dr David Probert
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
Dr David Probert411 views
Multi-Media Electronic Trade and Commerce by Dr David Probert
Multi-Media Electronic Trade and CommerceMulti-Media Electronic Trade and Commerce
Multi-Media Electronic Trade and Commerce
Dr David Probert215 views

Recently uploaded

PRODUCT LISTING.pptx by
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 views1 slide
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
52 views8 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
41 views73 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 by
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
127 views17 slides
handbook for web 3 adoption.pdf by
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 views16 slides
STPI OctaNE CoE Brochure.pdf by
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
14 views1 slide

Recently uploaded(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada136 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson85 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views

21stC Cybersecurity Trends: 2018-2025 & Beyond!...

  • 1. •• 2121ststCC CyberCyber Defence & TrendsDefence & Trends ........20182018 -- 20252025 && BeyondBeyond!....!.... 1 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ........20182018 -- 20252025 && BeyondBeyond!....!.... Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
  • 2. ISSAISSA CyberSecurity ConferenceCyberSecurity Conference -- 20182018 Venue:Venue: HQS WellingtonHQS Wellington -- Thames, LondonThames, London 2 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 HMS Wellington (U65)HMS Wellington (U65): “Grimsby: “Grimsby--Class Sloop”Class Sloop” -- Launched Devonport 1934Launched Devonport 1934 Photo:Photo: Ship Moorings @ Thames EmbankmentShip Moorings @ Thames Embankment
  • 3. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 3 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 6. Cyberspace CensusCyberspace Census -- 20122012 6 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Link:Link: census2012.sourceforge.net/census2012.sourceforge.net/hilberthilbert//
  • 7. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1) 7 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 8. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2) 8 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 9. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3) 9 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 10. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(4)Browser Zoom(4) 10 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Link:Link: census2012.sourceforge.net/census2012.sourceforge.net/hilberthilbert//
  • 11. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 11 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 12. The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace 12 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 13. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR“YOUR CyberCyber Defence”Defence” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 13 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence ““CyberCyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. ““NeuralNeural Security”Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea”@ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW“NEW CyberCyber Toolkit”Toolkit”
  • 14. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR“YOUR CyberCyber Defence”Defence” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar 14 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence ““CyberCyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. ““NeuralNeural Security”Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea”@ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW“NEW CyberCyber Toolkit”Toolkit” 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society”
  • 15. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 15 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 16. Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia 16 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
  • 17. CybersecurityCybersecurity forfor thethe Georgian ParliamentGeorgian Parliament 17 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Critical Infrastructure Audit during UN Cybersecurity Mission: Georgian ParliamentCritical Infrastructure Audit during UN Cybersecurity Mission: Georgian Parliament
  • 18. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 18 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
  • 19. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 19 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
  • 20. Securing Jamaica in Cyberspace!Securing Jamaica in Cyberspace! -- UN/ITU GuidelinesUN/ITU Guidelines -- (1)(1) –– Legal MeasuresLegal Measures -- (2)(2) –– Technical &Technical & ProceduralProcedural --(3)(3) –– OrganizationalOrganizational -- (4)(4) –– CapacityCapacity BuildingBuilding 20 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ProceduralProcedural MeasuresMeasures OrganizationalOrganizational StructuresStructures -- (5)(5) –– International CollaborationInternational Collaboration
  • 21. Securing Jamaica in Cyberspace!Securing Jamaica in Cyberspace! -- UN/ITU GuidelinesUN/ITU Guidelines -- (1)(1) –– Legal MeasuresLegal Measures -- (2)(2) –– Technical &Technical & ProceduralProcedural --(3)(3) –– OrganizationalOrganizational -- (4)(4) –– CapacityCapacity BuildingBuilding ** UN/ITUUN/ITU: Cybersecurity Training: Cybersecurity Training -- UTECH, JamaicaUTECH, Jamaica ** Government, Central Bank, EnergyGovernment, Central Bank, Energy & T& Telecoms Sectorselecoms Sectors 21 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ProceduralProcedural MeasuresMeasures OrganizationalOrganizational StructuresStructures -- (5)(5) –– International CollaborationInternational Collaboration
  • 22. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 22 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 23. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 23 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 24. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 24 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 25. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 25 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 26. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 26 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! --
  • 27. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 27 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! -- “BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
  • 28. MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017 Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!... 28 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 *** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
  • 29. Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017 29 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...) ....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
  • 30. MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016 30 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!... “Internet of Threats”!“Internet of Threats”!
  • 31. CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016 31 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things) HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange - PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
  • 32. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats “Y“YOUR CyberOUR Cyber Defence”Defence” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 32 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea@ Sea”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” ThrustSSC – 1st Supersonic Car – October 1997
  • 33. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats “Y“YOUR CyberOUR Cyber Defence”Defence” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 22 –– TOP 10TOP 10 CyberCyber Attacks & Threats!Attacks & Threats! “Y“YOUROUR CyberCyber Defence”Defence” 33 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea@ Sea”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Y“YOUROUR CyberCyber Defence”Defence” ThrustSSC – 1st Supersonic Car – October 1997
  • 34. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 34 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 35. Thrust SSCThrust SSC –– “Breaking the Sound Barrier”“Breaking the Sound Barrier” ** Mach ONEMach ONE -- 1228km/h1228km/h –– October 1997 *October 1997 * 35 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 36. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** BloodHoundBloodHound SSC 2017SSC 2017 ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 36 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com 1997 Thrust SSC1997 Thrust SSC Mach ONEMach ONE
  • 37. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220M Yrs220M Yrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence” “Emergence of DNA/Genetic Code”“Emergence of DNA/Genetic Code” 37 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• 20032003-- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans ...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!.....)!.....
  • 38. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220MYrs220MYrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... 38 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• 20032003 -- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans 2121ststC “Cyber” (C “Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!.....)!..... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
  • 39. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20182018 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 39 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 40. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20182018 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 40 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 41. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 41 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 42. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack 42 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 43. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 43 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 44. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 44 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 45. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 45 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 46. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 46 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists! Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
  • 47. “Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 47 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!... ...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
  • 48. Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815 48 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ““ClauzewitzClauzewitz”” is relevant tois relevant to Cyber Campaigns!Cyber Campaigns!
  • 49. Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812 49 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns! 21stC21stC Cyber WarCyber War && Peace!Peace!
  • 50. 2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism” DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY “Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools & Resources to extensively& Resources to extensively ResearchResearch && LaunchLaunch MajorMajor Physical Terror Attacks!Physical Terror Attacks! 50 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Physical Terror Attacks!Physical Terror Attacks! (1)(1) DarkWebDarkWeb forfor Weapons!Weapons! (2)(2) ResearchResearch Urban TargetsUrban Targets (3)(3) Social MediaSocial Media forfor CommsComms (4)(4) RecruitmentRecruitment & Training& Training (5)(5) RansomwareRansomware for CAfor CA$$H..H..
  • 51. Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!... • Skills required by the “Bad Guys”“Bad Guys” to launch and manage major Cyber Crime Campaigns: •• ICT:ICT: Cyber Technical Specialist (Hacking Tools) •• Finance:Finance: Money Laundering & Campaign Budget •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt 51 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt •• Project Management:Project Management: Co-ordinate Campaign! •• Security:Security: Detect “BackDoors” both in the Physical and Cyber Defences of the Target Business/Govt ...In summary, the “Bad Guys”“Bad Guys” will often organise themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
  • 52. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkWebDarkWeb”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 52 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 53. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkWebDarkWeb”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 53 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 54. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber Defence”Defence” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 54 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @@ SeaSea”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” Ship: SS Kinsembo – Liverpool to Congo - 1885
  • 55. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber Defence”Defence” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security“Integrated Security”” 55 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @@ SeaSea”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Integrated Security“Integrated Security”” Ship: SS Kinsembo – Liverpool to Congo - 1885
  • 56. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 56 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 57. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 57 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 58. OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+ •• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged “Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO” •• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed “Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things” 58 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to “Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools •• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
  • 59. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated Security****** Integrated Security*** • Major Trends & Developments: Scenario 2018Scenario 2018: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 59 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
  • 60. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 60 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 61. Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance 61 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
  • 62. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 62 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Dashboard!Dashboard! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things CSIM Example: “VIDSYS Inc - Enterprise 2018”
  • 63. Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management” 63 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 64. IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack •• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce YOUR Risks of Cyber Threats & Attacks... –– Device & Access AuthenticationDevice & Access Authentication by Fingerprints, Retinal/Iris Scan or Palm Vein Scan –– Facility AccessFacility Access with “Live” 3D Facial Recognition –– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked 64 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication –– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked CCTV & Real-Time Self-Learning Video Analytics –– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials – (CChemical, BBiological, RRadiological, NNuclear) ...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated with the CSO-led Business Security OperationsBusiness Security Operations
  • 65. TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions 65 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 66. CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions 66 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 67. CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics 67 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 68. CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans 68 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 69. Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”! 69 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930 “Forensics Pioneer”“Forensics Pioneer” a)a) Detective WorkDetective Work b)b) FingerprintsFingerprints c)c) Ciphers & CodesCiphers & Codes d)d) FootprintsFootprints e)e) HandwritingHandwriting
  • 70. Forensics:Forensics: Fast DNA Finger PrintingFast DNA Finger Printing 70 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 71. Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore 71 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 72. CyberCyber--Bio:Bio: IntegratedIntegrated Security ScenariosSecurity Scenarios •• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats •• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft •• Defence/Military:Defence/Military: Cyber-Espionage & Attacks •• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs •• Culture/Sports:Culture/Sports: Major Events & Competitions •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions 72 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions •• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege •• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records” ...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL Our Business Sectors & Critical Infrastructure!
  • 73. “Real“Real--Time”Time” City Video SurveillanceCity Video Surveillance 73 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
  • 74. :: AI CyberAI Cyber--Bio SurveillanceBio Surveillance 74 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn” www.sensetime.comwww.sensetime.com
  • 75. :: AI CyberAI Cyber--Bio SurveillanceBio Surveillance 75 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn” www.sensetime.comwww.sensetime.com
  • 76. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber DefenceDefence”” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 76 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea”@ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” Ship: HMT Ascanius – Devonport to Durban - 1917
  • 77. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber DefenceDefence”” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 77 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends ““CyberCyber @ Sea”@ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Self“Self--Adaptive Security”Adaptive Security” Ship: HMT Ascanius – Devonport to Durban - 1917
  • 78. 78 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Trip Diary Link :Trip Diary Link : www.valentina.net/PWP/www.valentina.net/PWP/
  • 79. Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT” *** Adaptive Security****** Adaptive Security*** • Major Trends and Developments: Scenario 2020Scenario 2020 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 79 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 80. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 80 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 81. 20182018 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 81 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 82. 82 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 83. EU/IERCEU/IERC –– Research Cluster Reports:Research Cluster Reports: ““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things 83 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 84. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 84 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 85. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 85 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends “Cyber @ Sea”“Cyber @ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” Whiskey Class Submarine S189 – St Petersburg
  • 86. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 86 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 “OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends “Cyber @ Sea”“Cyber @ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning Security”Learning Security” Whiskey Class Submarine S189 – St Petersburg
  • 87. Whiskey ClassWhiskey Class –– Soviet Submarines (Project 613)Soviet Submarines (Project 613) Proposed Barter Deal in 1992 for ITProposed Barter Deal in 1992 for IT Training CentreTraining Centre ((СПИИРАНСПИИРАН)) 87 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 88. KolaNet ProjectKolaNet Project -- Nuclear Safety & SecurityNuclear Safety & Security :: RussiaRussia 88 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 89. KolaNet ProjectKolaNet Project -- Nuclear Safety & SecurityNuclear Safety & Security :: RussiaRussia 89 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 90. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can 90 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can mitigate risks of new malware that have no prior “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 91. “Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018! -- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! -- • 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts) • 1948 – “Cybernetics” – Norbert Wiener • 1969 – ARPANet Launched – 4 Packet Switching Net Nodes - • 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn • 1982 – Elk Cloner - 1st “Apple Computer Virus • 1986 – “Brain” – 1st Microsoft MS-DOS Virus 91 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 • 1986 – “Brain” – 1st Microsoft MS-DOS Virus • 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp) • 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee • 1993 – Mosaic Browser – NCSA – Illinois, USA • 2018 –Transition to AI/ML Apps for 21stC CyberSecurity! -- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
  • 92. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 92 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 93. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 93 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 David ProbertDavid Probert
  • 94. ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools” *** Self*** Self--Learning Security ***Learning Security *** • Major Trends and Developments: Scenario 2025Scenario 2025 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 94 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 95. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 95 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 96. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 96 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 97. Smart 3D Network Cyber Simulation:Smart 3D Network Cyber Simulation: HyperglanceHyperglance 97 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 www.hyperglance.comwww.hyperglance.com
  • 98. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 98 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 99. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 99 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 100. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 100 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 101. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 101 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 102. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 102 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
  • 103. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 103 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends “Cyber @ Sea”“Cyber @ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit”
  • 104. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent Security”Intelligent Security” 104 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 ––Scenario 2025Scenario 2025:: ArtificialArtificial IntellgenceIntellgence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends “Cyber @ Sea”“Cyber @ Sea” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Cyber“Cyber--Intelligent Security”Intelligent Security”
  • 105. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 105 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 106. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 106 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 34 yearsReview Past 34 years-->> 20162016 <<-- Explore Future 34 yearsExplore Future 34 years-->> 20502050
  • 107. ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security” • Transition & Full Deployment of Enterprise-Wide AI/ML-based IntelligentIntelligent “CyberSecurity” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to 107 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to augment Classic Detection using “Known Bad”,“Known Bad”, and hence provide New Generation “Defence In“Defence In--Depth”Depth” • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both Traditional & Advanced AI/ML “Cybersecurity Tools”
  • 108. HybridHybrid 2121ststC Business OrganisationC Business Organisation -- Hierarchical & NetworkedHierarchical & Networked -- •• TransitionTransition from 20thC to 21stC Business, Governance & Security requires fundamental re-structuring of operations: –– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies - ”Pyramids””Pyramids” - to manually process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” 108 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” •• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of their extended nervous system (Brain & BodyBrain & Body) to optimise real-time learning and effective self-organising environmental adaptation! •• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks. ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
  • 109. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 109 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 110. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 110 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 111. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm 111 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 112. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 112 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 www.nvidia.comwww.nvidia.com NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
  • 113. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 113 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 114. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 114 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 115. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 115 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 116. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 116 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
  • 117. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 117 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat *** www.deepinstinct.comwww.deepinstinct.com
  • 118. SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled “Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”... 118 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018
  • 119. SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy -- DistributedDistributed BlockChainBlockChain Payment NetPayment Net -- 119 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
  • 120. SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy -- DistributedDistributed BlockChainBlockChain Payment NetPayment Net -- 120 “21stC CyberSecurity Defence & Trends” **** From 2018 - 2025 & Beyond! **** HQS Wellington, London, UK – 5th July 2018 © Dr David E. Probert : www.VAZA.com © ISSA Summer CyberSecurity Conference 2018ISSA Summer CyberSecurity Conference 2018 LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel