SlideShare a Scribd company logo
1 of 36
Download to read offline
Managing Cyber Security
p e t e r c o c h r a n e . c o m
B e y o n d I T G e e k d o m s !
P e t e r C o c h r a n e O B E
CyberCluster Sept 2019
B I G G E S T T H R E AT
People: innocent, naive, careless
“Most don’t see security as their
problem or responsibility””
B i gg est D a n g e r
C h a i r m a n , B o a rd a n d N E D s
“Why do you need $$$
for security when we
don’t have a problem ?”
HR
Finance
Legal
PR
“No Security position
on the board and a
very poor grasp of
technology”
technophobes
I hate all this tech stuff !
“Unwilling to try to learn &
understand the most basic
of tools that children now
consider to be the norm”
A dying breed - but if they
are in positions of power
and control they can inflict
serious damage!
Silly, Naive, Foolish
Reckless, Careless
Innocent, Ignorant
Arrogant, Negative
Close Minded +++
M B A B U B B L ES
C l o u d e d b y m a n y m y t h s
• I know everything about business
• I can manage/lead any kind of enterprise
• I don’t need to understand the technology
• All businesses are fundamentally the same
• I don’t need detailed understanding of ‘X’
• The principles I know are sufficient
• All problems are essentially simple
• My job is one of control
“Isn’t Hubris a
Breakfast cereal ?”
W h y ( s e c u r i t y )
T h i n g s
F a i l !
“Not understanding IT basics
make people an ideal/soft
target for all forms of social
and tech based cyber attack”
Putting an organisation
at increased risk through
wilful ignorance is on a par with no
understanding the principles of the law!
I T D E P T I s o l a t i o n
Time to change relationships & language
“It is no use complaining that everyone ‘just
doesn’t get IT’ - all support teams are duty bound
to help staff/employees/contractors understand
and learn by whatever means necessary”
c y b e r s e c u r i t y
Abandon all the omnipotence
“The problem is much bigger than
you are and collaboration with all
suppliers and other
companies is now
essential”
No country or company
is and island and no one
can go-it-alone in this
Cyber War - we have
to collaborate and
share to survive
!
N o A n t i c i p at i o n - n o p l a n
Y o u w o u l d n o t r u n a b u s i n e s s t h i s w a y !
Talk to me people

WTF is happening?
“A r e a l l y u n c o m f o r t a b l e &
f r i g h t e n i n g p l a c e t o b e ”
R o g u e S t a t e s
C r i m i n a l s
G r o u p s
Hackers
A m a t e u r s
O p p o r t u n i s t s
F u n d i n g
R e s o u r c i n g
N e t w o r k i n g
P r o f i t a b i l i t y
R & D / S h a r i n g
M a r k e t P l a c e
C o o r d i n a t i o n
The big contrast
Networking/organised Hackers
C a p a b i l t y
T h r e a t
C u r v e
Motivated by $$$$
without constraint
or boundaries
Well planned &
fully resourced
attacks focused
o n m a x i m i s i n g
the ROI
R o g u e S t a t e s
C r i m i n a l s
G r o u p s
Hackers
A m a t e u r s
O p p o r t u n i s t s
F u n d i n g
R e s o u r c i n g
N e t w o r k i n g
P r o f i t a b i l i t y
R & D / S h a r i n g
M a r k e t P l a c e
C o o r d i n a t i o n
The big contrast
Networking/organised Hackers
C a p a b i l t y
T h r e a t
C u r v e
Motivated by $$$$
without constraint
or boundaries
Well planned &
fully resourced
attacks focused
o n m a x i m i s i n g
the ROI
Y
O
UN
G
ER
M
O
RE
SK
ILLED
BETTER
O
RG
A
N
ISED
FA
R
M
O
RE
O
F
THEM
THA
N
Y
O
UR
TEA
M
!
F o rt r ess M a n a g e m e n t
T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u !
“It only took the invention of
one new weapon to put an
end to this regime”
“Most companies are
engaged in repeating this
history but in the ICT domain”
!
F o rt r ess M a n a g e m e n t
T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u !
“It only took the invention of
one new weapon to put an
end to this regime”
“Most companies are
engaged in repeating this
history but in the ICT domain”
Attackers
Advantaged by surprise
Exploit your weaknesses
Unbounded in their actions
Employ unanticipated techniques
Choose the time and methodology
Approach from unexpected directions
Fundamentally without morals or ethics
!
G o o d d e f e n d e r s
W e r e o n c e g o o d a t t a c k e r s
“ T h i n k i n g l i k e t h e e n e m y a n d
a n t i c i p a t i n g t h e i r n e x t
m o v e i s e s s e n t i a l ”
To b e e f f e c t i v e t h e y n e e d
t o b e p a r t o f a g l o b a l
t e a m … i n d i v i d u a l s
& s t a n d a l o n e
t e a m s h a v e
l i t t l e o r n o
c h a n c e !
“ C a p a b i l i t y i m p a c t e d
b y m a n a g e m e n t
s t y l e & f u n d i n g ”
“Being continually exposed to threats,
& subject to attack from any direction
by any means at any time poses an
unacceptable risk”
P E R S P E C T I V E
It is hard to understate the risk
T H E T H R E A T L a n d s c a p e
T h e p ro - a c t i ve g ro u p s c o n s t i t u t i n g T h e D a r k S i d e
Fun
Fame
Notoriety
Vandalism
Limited Skills
Limited Resources
Tend to be Sporadic
Rogue States
Criminals
Hacker Groups
Hacktivist
Amateurs
Money
Sharing
Organic
Dispersed
Unbounded
Huge Effort
Progressive
Cooperatives
Self Organising
Vast Resources
Massive Market
Aggregated Skills
Semi-Professional
Substantial Networks
Skilled
Political
Idealists
Emotional
Relentless
Dedicated
Cause Driven
Vast Networks
Varied Missions
Targeted Attacks
Evolving Community
Drugs
Fraud
Global
Extreme
Extortion
Business
Unbounded
Professional
Well Managed
Well Organised
Ahead of the Curve
Orchestrated Effort
Extremely Profitable
Syndicated Resources
Massive Attack Surface
Vast up-to-date Abilities
Covert
Money
WarFare
Influence
Pervasive
Disruption
Espionage
Professional
Sophisticated
Well Organised
Extreme Creativity
Orchestrated Effort
Political Influencers
~Unlimited Resources
Tech/Thought Leaders
Regime Destabilisation
Population Manipulation
Military and Civil Domains
“Most attacks/attack-types/info-corruption
/security failures can be traced back
to human fallibility”
P E R S P E C T I V E
A growing people problem/crisis 2019 Security Survey and Report
P E R S P E C T I V E
Technology only a partial solution 2019 Security Survey and Report
https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
P E R S P E C T I V E
No sector or organisation is safe 2019 Security Survey and Report
https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
P E R S P E C T I V E
Attack damage costs are rising 2019 Security Survey and Report
Source Site: https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
C Y B E R C R I M E
G r o w i n g g l o b a l b u s i n e s s
Crime
Online Black/Grey Markets
IP Theft
Data Exchange/Trading
CrimeWare
RansomeWare
Total Revenues
Revenues
$900 Bn
$500 Bn
$200 Bn
$2.0 Bn
$1.5 Bn
>$1600
Dark Side Employee Earnings
Hacker ~ $30k/job = $80 - 170 k/year
Team Leader ~ $2M/year
Data derived from numerous published reports including:
https://www.thesslstore.com/blog/2018-cybercrime-statistics/
Networked global teams operating in an open
market of sharing groups that invest in people
R&D and highly adaptive/cooperative innovation
!
I g n o r a n c e & N o P l a n
A l w a y s r e s u l t s i n a r a p i d e s c a l a t i o n
“ E v e r y t h i n g h a p p e n i n g a n d
f a i l i n g f a s t e r t h a n a n y
h u m a n c a n t h i n k
a n d / o r a c t ”
!
IF Panic ensues
T h e n t h e g a m e i s o v e r
“ I r r a t i o n a l i t y a n d b a d
d e c i s i o n s e s c a l a t e t h e
w h o l e s i t u a t i o n a n d
t h e e n e m y h a s w o n ”
“ U n c e r t a i n t y a n d
i n d e c i s i o n o n l y s e r v e s
t o a m p l i f y t h e r i s k a n d
i n c r e a s e t h e c h a o s ”
W hat W e need to DO
To win, we have to be much smarter
!The Dark Side are 100% committed and see this war as
total; and a much wider conflict than CYBER alone…
We therefore have to be far more integrated & sharing
- a networked & virtualised workforce driven by the
greater good and loss/damage minimisation is needed…
We need to be better informed and alert to the latest
threat scenarios and solutions - and we have to rehearse
our response to all known forms of attack
We have to anticipate the innovations of the Dark Side: their
technologies, tools, tactics, modes of attack, and we really
have to start think as they do…
W hat W e need to DO
Involve everyone in the organisation
Board
People
Visitors
Suppliers
Managers
Customers
Contractors
Create an
eco-system of:
capable & aware;
networked & motivated;
supportive and skilled people,
groups, companies and organisation for the
sharing of data, experiences, solutions, resources
!
W hat W e need to DO
Add a Main Board ITC Cyber Security seat
W hat W e need to DO
Make cyber security a part of the culture
“Security
should not
be seen as an extra workload
but more like ‘breathing’ - a
necessary & subliminal function”
W hat W e need to DO
Look for attack/event pre- cursors
They are out there somewhere hidden
in day-to-day data/behaviours!
Looking for statistical
anomalies & exceptions
from
patterns of activity
of people, machines &
networks reveals many
hidden attack modes…
A new and
developing field
W hat W e need to DO
Automate as much as possible
Humans, nets & machines tend to be habitual
All attacks have precursors
B e i n g b l i n d
N o t a v i a b l e o p t i o n
“Being continually exposed to threats,
& subject to attack from any direction
by any means at any time poses an
unacceptable risk”
B e i n g b l i n d
N o t a v i a b l e o p t i o n
“Being continually exposed to threats,
& subject to attack from any direction
by any means at any time poses an
unacceptable risk”
B e i n g b l i n d
N o t a v i a b l e o p t i o n
“Being continually exposed to threats,
& subject to attack from any direction
by any means at any time poses an
unacceptable risk”
S
it
u
a
t
io
n
a
l
a
w
a
r
en
es
s
is
es
s
en
t
ia
l
in
a
ll
fo
r
m
s
o
f
W
a
r
fa
r
e
S
u
r
p
r
is
e
a
t
t
a
c
k
s
a
r
e
A
lm
o
s
t
Im
p
o
s
s
ib
le
t
o
c
o
u
n
t
er
!
m i l i ta ry - W a r G a m es
P l a y a l l d a y & o c c a s i o n a l l y f i g h t
“ T h e r e i s n o t h i n g q u i t e
l i k e b e i n g s h o t a t ”
A s s u m i n g t h e r o l e o f t h e a t t a c k e ra n d t h e n d e f e n d e r i s a
g a m e r i c h i n
e x p e r i e n c e s
!
m i l i ta ry - W a r G a m es
P l a y a l l d a y & o c c a s i o n a l l y f i g h t
The
m
ilitary
plaN
and
play
all
day
occasionally
they
go
to
w
ar
Com
panies
are
At
w
ar
everyday
but
never
plan
or
play
M O R E D E P T H
The technical detail is extensive
For a selection of overview and in depth presentations GOTO:
https://www.slideshare.net/PeterCochrane/it-and-systems-security-the-bigger-picture
https://www.slideshare.net/PeterCochrane/people-the-biggest-cyber-risk
https://www.slideshare.net/PeterCochrane/how-to-build-a-truth-engine
https://www.slideshare.net/PeterCochrane/sentient-cyber-security
https://www.slideshare.net/PeterCochrane/holistic-security
https://www.slideshare.net/PeterCochrane/the-iot-for-real
For a selection of overview and in depth presentations GOTO:
Thank You
https://petercochrane.com
Is this the main event or a subterfuge?
Is this the main event or a subterfuge?
Text
Is this the main event or a subterfuge?

More Related Content

What's hot

AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
University of Hertfordshire
 
Digital Destinies
Digital DestiniesDigital Destinies
Digital Destinies
University of Hertfordshire
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
University of Hertfordshire
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
University of Hertfordshire
 
Patient Heal Thyself
Patient Heal ThyselfPatient Heal Thyself
Patient Heal Thyself
University of Hertfordshire
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
University of Hertfordshire
 
The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
University of Hertfordshire
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
University of Hertfordshire
 
The Stadium Business - Technology of Engagement
The Stadium Business - Technology of EngagementThe Stadium Business - Technology of Engagement
The Stadium Business - Technology of Engagement
University of Hertfordshire
 
The Automation of Everything
The Automation of EverythingThe Automation of Everything
The Automation of Everything
University of Hertfordshire
 
Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
University of Hertfordshire
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
University of Hertfordshire
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
University of Hertfordshire
 

What's hot (20)

AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
 
Digital Destinies
Digital DestiniesDigital Destinies
Digital Destinies
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
Telecom service futures driven by customer need
Telecom service futures driven by customer needTelecom service futures driven by customer need
Telecom service futures driven by customer need
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 
Patient Heal Thyself
Patient Heal ThyselfPatient Heal Thyself
Patient Heal Thyself
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
WHY ROBOTICS, AI, AL & QUANTUM COMPUTING
WHY ROBOTICS, AI, AL & QUANTUM COMPUTINGWHY ROBOTICS, AI, AL & QUANTUM COMPUTING
WHY ROBOTICS, AI, AL & QUANTUM COMPUTING
 
The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
 
Science and Engineering Out of The Box
Science and Engineering Out of The BoxScience and Engineering Out of The Box
Science and Engineering Out of The Box
 
Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
 
Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
 
The Stadium Business - Technology of Engagement
The Stadium Business - Technology of EngagementThe Stadium Business - Technology of Engagement
The Stadium Business - Technology of Engagement
 
The Automation of Everything
The Automation of EverythingThe Automation of Everything
The Automation of Everything
 
Industry 4.0 Imperatives 工业4.0势在必行
Industry 4.0 Imperatives   工业4.0势在必行Industry 4.0 Imperatives   工业4.0势在必行
Industry 4.0 Imperatives 工业4.0势在必行
 
Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 

Similar to Managing cyber security

CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
University of Hertfordshire
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
Surveillance society
Surveillance societySurveillance society
Surveillance society
University of Hertfordshire
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
University of Hertfordshire
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
University of Hertfordshire
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
University of Hertfordshire
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
University of Hertfordshire
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Voip Cyber Security
Voip Cyber SecurityVoip Cyber Security
Voip Cyber Security
University of Hertfordshire
 
Evolving it security Threats and Solutions
Evolving it security  Threats and SolutionsEvolving it security  Threats and Solutions
Evolving it security Threats and Solutions
University of Hertfordshire
 

Similar to Managing cyber security (20)

IT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger PictureIT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger Picture
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Surveillance society
Surveillance societySurveillance society
Surveillance society
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Thinking like a Network
Thinking like a NetworkThinking like a Network
Thinking like a Network
 
Voip Cyber Security
Voip Cyber SecurityVoip Cyber Security
Voip Cyber Security
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Evolving it security Threats and Solutions
Evolving it security  Threats and SolutionsEvolving it security  Threats and Solutions
Evolving it security Threats and Solutions
 
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamCYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
The Future of Content
The Future of ContentThe Future of Content
The Future of Content
 
Eianz how good is science.. as good as the humans who perceive it michele h...
Eianz  how good is science.. as good as the humans who perceive it  michele h...Eianz  how good is science.. as good as the humans who perceive it  michele h...
Eianz how good is science.. as good as the humans who perceive it michele h...
 

More from University of Hertfordshire

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
University of Hertfordshire
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
University of Hertfordshire
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
University of Hertfordshire
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
University of Hertfordshire
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
University of Hertfordshire
 
Biometrics of ID and Security
Biometrics of ID and SecurityBiometrics of ID and Security
Biometrics of ID and Security
University of Hertfordshire
 

More from University of Hertfordshire (17)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
Cyber Security - Becoming Evil
Cyber Security - Becoming EvilCyber Security - Becoming Evil
Cyber Security - Becoming Evil
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
 
QUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECKQUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECK
 
Industry 4.0 and Sustainability
Industry 4.0 and SustainabilityIndustry 4.0 and Sustainability
Industry 4.0 and Sustainability
 
Biometrics of ID and Security
Biometrics of ID and SecurityBiometrics of ID and Security
Biometrics of ID and Security
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
anilsa9823
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima S
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for Learning
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 

Managing cyber security

  • 1. Managing Cyber Security p e t e r c o c h r a n e . c o m B e y o n d I T G e e k d o m s ! P e t e r C o c h r a n e O B E CyberCluster Sept 2019
  • 2. B I G G E S T T H R E AT People: innocent, naive, careless “Most don’t see security as their problem or responsibility””
  • 3. B i gg est D a n g e r C h a i r m a n , B o a rd a n d N E D s “Why do you need $$$ for security when we don’t have a problem ?” HR Finance Legal PR “No Security position on the board and a very poor grasp of technology”
  • 4. technophobes I hate all this tech stuff ! “Unwilling to try to learn & understand the most basic of tools that children now consider to be the norm” A dying breed - but if they are in positions of power and control they can inflict serious damage! Silly, Naive, Foolish Reckless, Careless Innocent, Ignorant Arrogant, Negative Close Minded +++
  • 5. M B A B U B B L ES C l o u d e d b y m a n y m y t h s • I know everything about business • I can manage/lead any kind of enterprise • I don’t need to understand the technology • All businesses are fundamentally the same • I don’t need detailed understanding of ‘X’ • The principles I know are sufficient • All problems are essentially simple • My job is one of control “Isn’t Hubris a Breakfast cereal ?”
  • 6. W h y ( s e c u r i t y ) T h i n g s F a i l ! “Not understanding IT basics make people an ideal/soft target for all forms of social and tech based cyber attack” Putting an organisation at increased risk through wilful ignorance is on a par with no understanding the principles of the law!
  • 7. I T D E P T I s o l a t i o n Time to change relationships & language “It is no use complaining that everyone ‘just doesn’t get IT’ - all support teams are duty bound to help staff/employees/contractors understand and learn by whatever means necessary”
  • 8. c y b e r s e c u r i t y Abandon all the omnipotence “The problem is much bigger than you are and collaboration with all suppliers and other companies is now essential” No country or company is and island and no one can go-it-alone in this Cyber War - we have to collaborate and share to survive
  • 9. ! N o A n t i c i p at i o n - n o p l a n Y o u w o u l d n o t r u n a b u s i n e s s t h i s w a y ! Talk to me people WTF is happening? “A r e a l l y u n c o m f o r t a b l e & f r i g h t e n i n g p l a c e t o b e ”
  • 10. R o g u e S t a t e s C r i m i n a l s G r o u p s Hackers A m a t e u r s O p p o r t u n i s t s F u n d i n g R e s o u r c i n g N e t w o r k i n g P r o f i t a b i l i t y R & D / S h a r i n g M a r k e t P l a c e C o o r d i n a t i o n The big contrast Networking/organised Hackers C a p a b i l t y T h r e a t C u r v e Motivated by $$$$ without constraint or boundaries Well planned & fully resourced attacks focused o n m a x i m i s i n g the ROI
  • 11. R o g u e S t a t e s C r i m i n a l s G r o u p s Hackers A m a t e u r s O p p o r t u n i s t s F u n d i n g R e s o u r c i n g N e t w o r k i n g P r o f i t a b i l i t y R & D / S h a r i n g M a r k e t P l a c e C o o r d i n a t i o n The big contrast Networking/organised Hackers C a p a b i l t y T h r e a t C u r v e Motivated by $$$$ without constraint or boundaries Well planned & fully resourced attacks focused o n m a x i m i s i n g the ROI Y O UN G ER M O RE SK ILLED BETTER O RG A N ISED FA R M O RE O F THEM THA N Y O UR TEA M
  • 12. ! F o rt r ess M a n a g e m e n t T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u ! “It only took the invention of one new weapon to put an end to this regime” “Most companies are engaged in repeating this history but in the ICT domain”
  • 13. ! F o rt r ess M a n a g e m e n t T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u ! “It only took the invention of one new weapon to put an end to this regime” “Most companies are engaged in repeating this history but in the ICT domain” Attackers Advantaged by surprise Exploit your weaknesses Unbounded in their actions Employ unanticipated techniques Choose the time and methodology Approach from unexpected directions Fundamentally without morals or ethics
  • 14. ! G o o d d e f e n d e r s W e r e o n c e g o o d a t t a c k e r s “ T h i n k i n g l i k e t h e e n e m y a n d a n t i c i p a t i n g t h e i r n e x t m o v e i s e s s e n t i a l ” To b e e f f e c t i v e t h e y n e e d t o b e p a r t o f a g l o b a l t e a m … i n d i v i d u a l s & s t a n d a l o n e t e a m s h a v e l i t t l e o r n o c h a n c e ! “ C a p a b i l i t y i m p a c t e d b y m a n a g e m e n t s t y l e & f u n d i n g ”
  • 15. “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk” P E R S P E C T I V E It is hard to understate the risk
  • 16. T H E T H R E A T L a n d s c a p e T h e p ro - a c t i ve g ro u p s c o n s t i t u t i n g T h e D a r k S i d e Fun Fame Notoriety Vandalism Limited Skills Limited Resources Tend to be Sporadic Rogue States Criminals Hacker Groups Hacktivist Amateurs Money Sharing Organic Dispersed Unbounded Huge Effort Progressive Cooperatives Self Organising Vast Resources Massive Market Aggregated Skills Semi-Professional Substantial Networks Skilled Political Idealists Emotional Relentless Dedicated Cause Driven Vast Networks Varied Missions Targeted Attacks Evolving Community Drugs Fraud Global Extreme Extortion Business Unbounded Professional Well Managed Well Organised Ahead of the Curve Orchestrated Effort Extremely Profitable Syndicated Resources Massive Attack Surface Vast up-to-date Abilities Covert Money WarFare Influence Pervasive Disruption Espionage Professional Sophisticated Well Organised Extreme Creativity Orchestrated Effort Political Influencers ~Unlimited Resources Tech/Thought Leaders Regime Destabilisation Population Manipulation Military and Civil Domains “Most attacks/attack-types/info-corruption /security failures can be traced back to human fallibility”
  • 17. P E R S P E C T I V E A growing people problem/crisis 2019 Security Survey and Report
  • 18. P E R S P E C T I V E Technology only a partial solution 2019 Security Survey and Report https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  • 19. P E R S P E C T I V E No sector or organisation is safe 2019 Security Survey and Report https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  • 20. P E R S P E C T I V E Attack damage costs are rising 2019 Security Survey and Report Source Site: https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  • 21. C Y B E R C R I M E G r o w i n g g l o b a l b u s i n e s s Crime Online Black/Grey Markets IP Theft Data Exchange/Trading CrimeWare RansomeWare Total Revenues Revenues $900 Bn $500 Bn $200 Bn $2.0 Bn $1.5 Bn >$1600 Dark Side Employee Earnings Hacker ~ $30k/job = $80 - 170 k/year Team Leader ~ $2M/year Data derived from numerous published reports including: https://www.thesslstore.com/blog/2018-cybercrime-statistics/ Networked global teams operating in an open market of sharing groups that invest in people R&D and highly adaptive/cooperative innovation
  • 22. ! I g n o r a n c e & N o P l a n A l w a y s r e s u l t s i n a r a p i d e s c a l a t i o n “ E v e r y t h i n g h a p p e n i n g a n d f a i l i n g f a s t e r t h a n a n y h u m a n c a n t h i n k a n d / o r a c t ”
  • 23. ! IF Panic ensues T h e n t h e g a m e i s o v e r “ I r r a t i o n a l i t y a n d b a d d e c i s i o n s e s c a l a t e t h e w h o l e s i t u a t i o n a n d t h e e n e m y h a s w o n ” “ U n c e r t a i n t y a n d i n d e c i s i o n o n l y s e r v e s t o a m p l i f y t h e r i s k a n d i n c r e a s e t h e c h a o s ”
  • 24. W hat W e need to DO To win, we have to be much smarter !The Dark Side are 100% committed and see this war as total; and a much wider conflict than CYBER alone… We therefore have to be far more integrated & sharing - a networked & virtualised workforce driven by the greater good and loss/damage minimisation is needed… We need to be better informed and alert to the latest threat scenarios and solutions - and we have to rehearse our response to all known forms of attack We have to anticipate the innovations of the Dark Side: their technologies, tools, tactics, modes of attack, and we really have to start think as they do…
  • 25. W hat W e need to DO Involve everyone in the organisation Board People Visitors Suppliers Managers Customers Contractors Create an eco-system of: capable & aware; networked & motivated; supportive and skilled people, groups, companies and organisation for the sharing of data, experiences, solutions, resources
  • 26. ! W hat W e need to DO Add a Main Board ITC Cyber Security seat
  • 27. W hat W e need to DO Make cyber security a part of the culture “Security should not be seen as an extra workload but more like ‘breathing’ - a necessary & subliminal function”
  • 28. W hat W e need to DO Look for attack/event pre- cursors They are out there somewhere hidden in day-to-day data/behaviours!
  • 29. Looking for statistical anomalies & exceptions from patterns of activity of people, machines & networks reveals many hidden attack modes… A new and developing field W hat W e need to DO Automate as much as possible Humans, nets & machines tend to be habitual All attacks have precursors
  • 30. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk”
  • 31. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk”
  • 32. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk” S it u a t io n a l a w a r en es s is es s en t ia l in a ll fo r m s o f W a r fa r e S u r p r is e a t t a c k s a r e A lm o s t Im p o s s ib le t o c o u n t er
  • 33. ! m i l i ta ry - W a r G a m es P l a y a l l d a y & o c c a s i o n a l l y f i g h t “ T h e r e i s n o t h i n g q u i t e l i k e b e i n g s h o t a t ” A s s u m i n g t h e r o l e o f t h e a t t a c k e ra n d t h e n d e f e n d e r i s a g a m e r i c h i n e x p e r i e n c e s
  • 34. ! m i l i ta ry - W a r G a m es P l a y a l l d a y & o c c a s i o n a l l y f i g h t The m ilitary plaN and play all day occasionally they go to w ar Com panies are At w ar everyday but never plan or play
  • 35. M O R E D E P T H The technical detail is extensive For a selection of overview and in depth presentations GOTO: https://www.slideshare.net/PeterCochrane/it-and-systems-security-the-bigger-picture https://www.slideshare.net/PeterCochrane/people-the-biggest-cyber-risk https://www.slideshare.net/PeterCochrane/how-to-build-a-truth-engine https://www.slideshare.net/PeterCochrane/sentient-cyber-security https://www.slideshare.net/PeterCochrane/holistic-security https://www.slideshare.net/PeterCochrane/the-iot-for-real
  • 36. For a selection of overview and in depth presentations GOTO: Thank You https://petercochrane.com Is this the main event or a subterfuge? Is this the main event or a subterfuge? Text Is this the main event or a subterfuge?