SlideShare a Scribd company logo
1 of 66
A Positive #ChangeAgent’s
Guide to
Improving Cyber-Resiliency in
Our Exponential Times
dr. david a. bray, changeagents@peoplecentered.net
executive director, people-centered internet
Where We Are:
(1) Positive #ChangeAgents Need Flak Jackets
(2) Cyber-Resiliency & Our Exponential Era
(3) Three Cyber-Resiliency Axioms for Any Leader
(4) Cyber-Resiliency 101 & 201
(5) Light & Dark Sides of Exponential Trends
(6) Cyber-Resiliency 301 & 401
(7) Rapid “Graduate Course” on Coming Trends
(8) Why This All Matters
#ChangeAgents = Leaders who
“illuminate the way” and manage friction
of stepping outside the status quo
Why Cyber-Resiliency is Crucial
For Our Exponential Era
1969
Why Cyber-Resiliency is Crucial
For Our Exponential Era
1982
Why Cyber-Resiliency is Crucial
For Our Exponential Era
1993
Why Cyber-Resiliency is Crucial
For Our Exponential Era
2007
2014
next 7 years (2018-2025)
will see more change
than the last 20 years combined
exponential tends of current technologies
+ internet of everything + machine learning
+ longer-term advances in quantum
The #Exponential Storm
2013: 7B network devices
4 billion TB of digital data on the planet
~3B (out of 7.1B) people online
The #Exponential Storm
2013: 7B network devices
4 billion TB of digital data on the planet
~3B (out of 7.1B) people online
2025: 100B+ network devices
200+ billion TB of digital data on the planet
plus ~7B (out of 8B) people online
If We Put the 232 (~4.3 billion) Numbers
Addressable by IPv4 into a Beach Ball
The 2128 (~340 followed by 36 zeros) Numbers
Addressable by IPv6 Equal the Volume of our Sun
Where We Are:
Where We Are:
(1) Positive #ChangeAgents Need Flak Jackets
(2) Cyber-Resiliency & Our Exponential Era
(3) Three Cyber-Resiliency Axioms for Any Leader
(4) Cyber-Resiliency 101 & 201
(5) Light & Dark Sides of Exponential Trends
(6) Cyber-Resiliency 301 & 401
(7) Rapid “Graduate Course” on Coming Trends
(8) Why This All Matters
Cyber-Resiliency Axiom #1:
Leadership vs. Management
if all you do is only manage expectations,
you will fall behind in a changing world
à need #ChangeAgents to go beyond “status quo”
Cyber-Resiliency Axiom #2: The Current TCP/IP Stack
is Easier to Exploit vs. Harder to Defend
right now it much easier to launch cyber exploits than
prevent them à computer scientists & engineers know
this, yet most lawyers & policymakers don’t
Cyber-Resiliency Axiom #3: The Moment Resiliency &
Security are Jobs of Only One Division, You’ve Lost
greatest risks for exploits span how your organization
operates, including what people are:
(1) to do, (2) not to do, (3) not to forget to do
Cyber-Resiliency is More than Just Cybersecurity
It’s Risk Management
no one would claim they’d never get sick, so to
nothing ever 100% secure – we can strive for:
(1) prevention, (2) early detection, (3) rapid mitigation
Cyber-Resiliency is More than Just Cybersecurity
It’s Risk Management
1500s = physical parameter defense is outdated
2010 = digital parameter defense is outdated
Improving Cyber-Resiliency 101:
Good “Organizational Hygiene” Fundamentals
follow the Australian Signals Directorate’s “Top 8”
= solid foundation for a rapidly changing world
+ if you want extra credit, can do the SANS 20
85% of Incidents Occur
When Someone Does
Not Do One of “Top 8”
Cyber-Resiliency 101: Australian Signals Directorate’s
1st Part of the “Top 8” Prevent Malware Infections
1. Application Whitelisting 2. Patch Applications
3. Disable untrusted macros 4. Harden user apps
Cyber-Resiliency 101: Australian Signals Directorate’s
2nd Part of the “Top 8” Limit Extent of Any Incident
5. Reduce Admin Privileges 6. Patch Op. Systems
7. Use Multi-Factor Logons 8. Backup Vital Data Daily
Improving Cyber-Resiliency 201:
A Choice of Two Paths
the blue pill: document 100+ compliance security
checks – yet still get undone by a new zero-day
or novel social engineering exploit
the blue pill: document 100+ compliance security
as cyber tools
improve at bottom
of Open Systems
Interconnection OSI
Model, exploits are
moving up layers
the blue pill: document 100+ compliance security
as cyber tools
improve at bottom
of Open Systems
Interconnection OSI
Model, exploits are
moving up layers
Improving Cyber-Resiliency 201:
A Choice of Two Paths
the red pill: change the game, strengthen controls
around (1) digital identities, (2) vital data, and
(3) processes tying data access to digital identities
Improving Cyber-Resiliency 201:
A Choice of Two Paths
the red pill: change the game, strengthen controls
avoid system-wide
data access rights,
don’t become a
tempting one-stop
“databank”
digital identity controls
w/ single sign-on =
view behaviors across
systems, time,
& geography
data access controls
w/ granular access =
limit view or edit
rights to specific
digital identities
perform immutable audits of access tied to identity
monitor for intrusion or insider threat behaviors &
establish “patterns of life” intervene if non-normal
Where We Are:
Where We Are:
(1) Positive #ChangeAgents Need Flak Jackets
(2) Cyber-Resiliency & Our Exponential Era
(3) Three Cyber-Resiliency Axioms for Any Leader
(4) Cyber-Resiliency 101 & 201
(5) Light & Dark Sides of Exponential Trends
(6) Cyber-Resiliency 301 & 401
(7) Rapid “Graduate Course” on Coming Trends
(8) Why This All Matters
Confront An Average Internet Minute:
Light Side
204,000,000+ emails sent globally
4,000,000+ Google search queries
2,460,000+ pieces of Facebook content shared
72+ hours of new YouTube video uploaded
48,000+ iOS apps downloaded
_____________________________________________
stats will grow exponentially in the years ahead
Confront An Average Internet Minute:
Dark Side
McAfee: 200+ new threat vectors/minute
FireEye: new malware every 3 mins
DOE/NNSA: receives 6,940+ attacks/min
DoD: 85% of emails received = spam
and receives 13,800+ nefarious emails/minute
_____________________________________________
stats will grow exponentially in the years ahead
Improving Cyber-Resiliency 301:
Simplify, Automate, Verify!
(1) get off legacy IT and focus on doing your own IT
only when you must
(2) automate wherever you can
(3) regularity re-verify whatever you trust
Improving Cyber-Resiliency 301:
Simplify, Automate, Verify!
(1) get off legacy IT and focus on doing your own IT
only when you must à embrace Software as a Service
simplify, simplify, simplify what you must maintain
Improving Cyber-Resiliency 301:
Simplify, Automate, Verify!
(2) automate wherever you can à automate any
required patching, image rebuilds, and monitoring of
identity access & data flow behavioral patterns
Stop Manually Patching
Wherever Possible!
Improving Cyber-Resiliency 301:
Simplify, Automate, Verify!
(3) regularity re-verify whatever you trust à are
humans, systems, and automated monitors operating
as intended? use independent testing to confirm
Verify What You
(Have To) Trust
Improving Cyber-Resiliency 401:
Assume You Cannot Trust Even Your Hardware
Meltdown = attacker "melts" security boundaries
normally enforced by hardware
can gain access to data that program
shouldn't normally be able to see,
including Admin-only data
Improving Cyber-Resiliency 401:
Assume You Cannot Trust Even Your Hardware
Spectre = attacker make a program reveal data
that should have been kept secret
exploits "speculative execution" branches
multiple variations & trickier to patch;
will be haunting us for some time
Improving Cyber-Resiliency 401:
Embrace the Exponential Future
Be Nimble! (Because the Attackers Will Be Too)
present a changing “attack surface”,
use ambiguity to your advantage à make it hard to
recon your digital enterprise
Improving Cyber-Resiliency 401:
Embrace the Exponential Future
Attackers Not Just Taking Data, Now Destroying Data
orgs need to bounce back much faster than before
from a destructive event à entire org needs to plan +
deploy IT + train everyone with this in mind
Where We Are:
Where We Are:
(1) Positive #ChangeAgents Need Flak Jackets
(2) Cyber-Resiliency & Our Exponential Era
(3) Three Cyber-Resiliency Axioms for Any Leader
(4) Cyber-Resiliency 101 & 201
(5) Light & Dark Sides of Exponential Trends
(6) Cyber-Resiliency 301 & 401
(7) Rapid “Graduate Course” on Coming Trends
(8) Why This All Matters
Rapid “Graduate Course” on Coming Trends
(1) Machine-Learning & AI Challenges
smart algorithms can be fooled with noise added
Rapid “Graduate Course” on Coming Trends
(1) Machine-Learning & AI Challenges
Rapid “Graduate Course” on Coming Trends
(2) Broader Definition of “Cybersecurity”
organizations could do everything right regarding
digital security and still loose trust overall
Rapid “Graduate Course” on Coming Trends
(2) Broader Definition of “Cybersecurity”
Rapid “Graduate Course” on Coming Trends
(3) Internet of Everything = Looming Train wreck?
the IoE could amplify potential “attack surface”
with billions of devices that are never patched
Rapid “Graduate Course” on Coming Trends
(3) Internet of Everything = Looming Train wreck?
the IoE could be billions of devices easy to turn
into digital zombies à who will notify individuals if
their refrigerator or thermostat is compromised?
Rapid “Graduate Course” on Coming Trends
(4) Potential Quantum Advances in a Decade
quantum computing allows accelerated factorization
of encryption keys à orgs with sensitive data may
want to consider quantum-resistant algorithms now?
Rapid “Graduate Course” on Coming Trends
(4) Potential Quantum Advances in a Decade
quantum entanglement, if achieved over distances,
allows “spooky actions at a distance” for unique
secure communications properties
Rapid “Graduate Course” on Coming Trends
(5) Boards Start to Require Deep Cyber Expertise?
presently, most board members not expected to go
deep on cyber-resiliency in the same way they would
on a profit and loss sheet à orgs not served well
Rapid “Graduate Course” on Coming Trends
(5) Boards Start to Require Deep Cyber Expertise?
boards and other oversight mechanisms better
served if members expected to be able
to go deep on cyber-resiliency
Rapid “Graduate Course” on Coming Trends
(6) General Data Protection Regulation In Europe
goes into effect in May 2018, has requirements for
data breach notification and penalties for all firms
processing EU data
Rapid “Graduate Course” on Coming Trends
(6) General Data Protection Regulation In Europe
GDPR also has impacts for individual consent
for sharing any personally identifiable information,
including IP addresses .
Rapid “Graduate Course” on Coming Trends
(7) New Forms of Organizing to Address Resiliency
growing interest to develop new approaches to
decentralized data to allow individual’s to choose
with whom (and when) they share personal data
Rapid “Graduate Course” on Coming Trends
(7) New Forms of Organizing to Address Resiliency
potential need to develop cyber epidemiology
preventive and response approaches to “infection
control” across herds of digital devices
Carl Sagan in 1994:
Look again at that dot.
That's here. That's home.
That's us.
On it everyone you love,
everyone you know –
Everyone you ever heard of, every human being
who ever was, lived out their lives.
To me, it underscores
our responsibility to deal
more kindly with one another –
And to preserve and cherish the pale blue dot,
the only home we've ever known.
Positive #ChangeAgents Needed
Now More Than Ever
Positive #ChangeAgents Needed
Now More Than Ever
onwards and upwards together
+ thank you

More Related Content

Similar to David Bray - Why Cyber-Resiliency Matters: Unprecedented Exponential Changes

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCourtney Brock Rabon, MBA
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud SecurityDatapipe
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?Utah Tech Labs
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 

Similar to David Bray - Why Cyber-Resiliency Matters: Unprecedented Exponential Changes (20)

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 

More from SUCanadaSummit

SingularityU Canada - Faculty Deck
SingularityU Canada - Faculty DeckSingularityU Canada - Faculty Deck
SingularityU Canada - Faculty DeckSUCanadaSummit
 
Health Care Shift – Zayna Khayat
Health Care Shift – Zayna KhayatHealth Care Shift – Zayna Khayat
Health Care Shift – Zayna KhayatSUCanadaSummit
 
SingularityU Canada Summit 2019 - Wrap Report
SingularityU Canada Summit 2019 - Wrap ReportSingularityU Canada Summit 2019 - Wrap Report
SingularityU Canada Summit 2019 - Wrap ReportSUCanadaSummit
 
Being an Exponential Thought Leader - Denise Brosseau
Being an Exponential Thought Leader - Denise BrosseauBeing an Exponential Thought Leader - Denise Brosseau
Being an Exponential Thought Leader - Denise BrosseauSUCanadaSummit
 
Why Self Driving Cars Won't Save The World - Ryan Gariepy
Why Self Driving Cars Won't Save The World - Ryan GariepyWhy Self Driving Cars Won't Save The World - Ryan Gariepy
Why Self Driving Cars Won't Save The World - Ryan GariepySUCanadaSummit
 
Moonshot Ideas in Health + Demo - Dr. Sonny Kohli
Moonshot Ideas in Health + Demo - Dr. Sonny KohliMoonshot Ideas in Health + Demo - Dr. Sonny Kohli
Moonshot Ideas in Health + Demo - Dr. Sonny KohliSUCanadaSummit
 
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany Vora
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany VoraWhat's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany Vora
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany VoraSUCanadaSummit
 
Driving Innovation, From Ideas to Execution - Dr. Cynthia Goh
Driving Innovation, From Ideas to Execution - Dr. Cynthia GohDriving Innovation, From Ideas to Execution - Dr. Cynthia Goh
Driving Innovation, From Ideas to Execution - Dr. Cynthia GohSUCanadaSummit
 
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn Kanungo
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn KanungoThe Innovator’s Mindset, Creating an Innovator's Mindset - Shawn Kanungo
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn KanungoSUCanadaSummit
 
Energy in an Interconnected World - Arash Aazami
Energy in an Interconnected World - Arash AazamiEnergy in an Interconnected World - Arash Aazami
Energy in an Interconnected World - Arash AazamiSUCanadaSummit
 
Fossil Futures and Transformative Innovation - Chad Park
Fossil Futures and Transformative Innovation - Chad ParkFossil Futures and Transformative Innovation - Chad Park
Fossil Futures and Transformative Innovation - Chad ParkSUCanadaSummit
 
The Future of Cleantech - Jane Kearns
The Future of Cleantech - Jane KearnsThe Future of Cleantech - Jane Kearns
The Future of Cleantech - Jane KearnsSUCanadaSummit
 
The Doctors Challenge - Philip Edgcumbe
The Doctors Challenge - Philip EdgcumbeThe Doctors Challenge - Philip Edgcumbe
The Doctors Challenge - Philip EdgcumbeSUCanadaSummit
 
DNA Cooking Show - Julie Legault
DNA Cooking Show - Julie LegaultDNA Cooking Show - Julie Legault
DNA Cooking Show - Julie LegaultSUCanadaSummit
 
The Future of Your Health - Dr. Tiffany Vora
The Future of Your Health - Dr. Tiffany VoraThe Future of Your Health - Dr. Tiffany Vora
The Future of Your Health - Dr. Tiffany VoraSUCanadaSummit
 
Your Future Ready Mindset - Frederik G. Pferdt
Your Future Ready Mindset - Frederik G. PferdtYour Future Ready Mindset - Frederik G. Pferdt
Your Future Ready Mindset - Frederik G. PferdtSUCanadaSummit
 
Seeing Opportunities in Toilets - Jack Sim
Seeing Opportunities in Toilets - Jack SimSeeing Opportunities in Toilets - Jack Sim
Seeing Opportunities in Toilets - Jack SimSUCanadaSummit
 
Technology and Reconciliation - Gabrielle Scrimshaw
Technology and Reconciliation - Gabrielle ScrimshawTechnology and Reconciliation - Gabrielle Scrimshaw
Technology and Reconciliation - Gabrielle ScrimshawSUCanadaSummit
 
Mobility Reimagined - Nick Dechev
Mobility Reimagined - Nick DechevMobility Reimagined - Nick Dechev
Mobility Reimagined - Nick DechevSUCanadaSummit
 
Citizenship in an Exponential Era - David Bray
Citizenship in an Exponential Era - David BrayCitizenship in an Exponential Era - David Bray
Citizenship in an Exponential Era - David BraySUCanadaSummit
 

More from SUCanadaSummit (20)

SingularityU Canada - Faculty Deck
SingularityU Canada - Faculty DeckSingularityU Canada - Faculty Deck
SingularityU Canada - Faculty Deck
 
Health Care Shift – Zayna Khayat
Health Care Shift – Zayna KhayatHealth Care Shift – Zayna Khayat
Health Care Shift – Zayna Khayat
 
SingularityU Canada Summit 2019 - Wrap Report
SingularityU Canada Summit 2019 - Wrap ReportSingularityU Canada Summit 2019 - Wrap Report
SingularityU Canada Summit 2019 - Wrap Report
 
Being an Exponential Thought Leader - Denise Brosseau
Being an Exponential Thought Leader - Denise BrosseauBeing an Exponential Thought Leader - Denise Brosseau
Being an Exponential Thought Leader - Denise Brosseau
 
Why Self Driving Cars Won't Save The World - Ryan Gariepy
Why Self Driving Cars Won't Save The World - Ryan GariepyWhy Self Driving Cars Won't Save The World - Ryan Gariepy
Why Self Driving Cars Won't Save The World - Ryan Gariepy
 
Moonshot Ideas in Health + Demo - Dr. Sonny Kohli
Moonshot Ideas in Health + Demo - Dr. Sonny KohliMoonshot Ideas in Health + Demo - Dr. Sonny Kohli
Moonshot Ideas in Health + Demo - Dr. Sonny Kohli
 
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany Vora
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany VoraWhat's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany Vora
What's Your Gut Feeling? Using microbiome as Your Secret Tool - Dr. Tiffany Vora
 
Driving Innovation, From Ideas to Execution - Dr. Cynthia Goh
Driving Innovation, From Ideas to Execution - Dr. Cynthia GohDriving Innovation, From Ideas to Execution - Dr. Cynthia Goh
Driving Innovation, From Ideas to Execution - Dr. Cynthia Goh
 
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn Kanungo
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn KanungoThe Innovator’s Mindset, Creating an Innovator's Mindset - Shawn Kanungo
The Innovator’s Mindset, Creating an Innovator's Mindset - Shawn Kanungo
 
Energy in an Interconnected World - Arash Aazami
Energy in an Interconnected World - Arash AazamiEnergy in an Interconnected World - Arash Aazami
Energy in an Interconnected World - Arash Aazami
 
Fossil Futures and Transformative Innovation - Chad Park
Fossil Futures and Transformative Innovation - Chad ParkFossil Futures and Transformative Innovation - Chad Park
Fossil Futures and Transformative Innovation - Chad Park
 
The Future of Cleantech - Jane Kearns
The Future of Cleantech - Jane KearnsThe Future of Cleantech - Jane Kearns
The Future of Cleantech - Jane Kearns
 
The Doctors Challenge - Philip Edgcumbe
The Doctors Challenge - Philip EdgcumbeThe Doctors Challenge - Philip Edgcumbe
The Doctors Challenge - Philip Edgcumbe
 
DNA Cooking Show - Julie Legault
DNA Cooking Show - Julie LegaultDNA Cooking Show - Julie Legault
DNA Cooking Show - Julie Legault
 
The Future of Your Health - Dr. Tiffany Vora
The Future of Your Health - Dr. Tiffany VoraThe Future of Your Health - Dr. Tiffany Vora
The Future of Your Health - Dr. Tiffany Vora
 
Your Future Ready Mindset - Frederik G. Pferdt
Your Future Ready Mindset - Frederik G. PferdtYour Future Ready Mindset - Frederik G. Pferdt
Your Future Ready Mindset - Frederik G. Pferdt
 
Seeing Opportunities in Toilets - Jack Sim
Seeing Opportunities in Toilets - Jack SimSeeing Opportunities in Toilets - Jack Sim
Seeing Opportunities in Toilets - Jack Sim
 
Technology and Reconciliation - Gabrielle Scrimshaw
Technology and Reconciliation - Gabrielle ScrimshawTechnology and Reconciliation - Gabrielle Scrimshaw
Technology and Reconciliation - Gabrielle Scrimshaw
 
Mobility Reimagined - Nick Dechev
Mobility Reimagined - Nick DechevMobility Reimagined - Nick Dechev
Mobility Reimagined - Nick Dechev
 
Citizenship in an Exponential Era - David Bray
Citizenship in an Exponential Era - David BrayCitizenship in an Exponential Era - David Bray
Citizenship in an Exponential Era - David Bray
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

David Bray - Why Cyber-Resiliency Matters: Unprecedented Exponential Changes

  • 1. A Positive #ChangeAgent’s Guide to Improving Cyber-Resiliency in Our Exponential Times dr. david a. bray, changeagents@peoplecentered.net executive director, people-centered internet
  • 2.
  • 3. Where We Are: (1) Positive #ChangeAgents Need Flak Jackets (2) Cyber-Resiliency & Our Exponential Era (3) Three Cyber-Resiliency Axioms for Any Leader (4) Cyber-Resiliency 101 & 201 (5) Light & Dark Sides of Exponential Trends (6) Cyber-Resiliency 301 & 401 (7) Rapid “Graduate Course” on Coming Trends (8) Why This All Matters
  • 4. #ChangeAgents = Leaders who “illuminate the way” and manage friction of stepping outside the status quo
  • 5. Why Cyber-Resiliency is Crucial For Our Exponential Era 1969
  • 6. Why Cyber-Resiliency is Crucial For Our Exponential Era 1982
  • 7. Why Cyber-Resiliency is Crucial For Our Exponential Era 1993
  • 8. Why Cyber-Resiliency is Crucial For Our Exponential Era 2007
  • 10. next 7 years (2018-2025) will see more change than the last 20 years combined exponential tends of current technologies + internet of everything + machine learning + longer-term advances in quantum
  • 11. The #Exponential Storm 2013: 7B network devices 4 billion TB of digital data on the planet ~3B (out of 7.1B) people online
  • 12. The #Exponential Storm 2013: 7B network devices 4 billion TB of digital data on the planet ~3B (out of 7.1B) people online 2025: 100B+ network devices 200+ billion TB of digital data on the planet plus ~7B (out of 8B) people online
  • 13. If We Put the 232 (~4.3 billion) Numbers Addressable by IPv4 into a Beach Ball
  • 14. The 2128 (~340 followed by 36 zeros) Numbers Addressable by IPv6 Equal the Volume of our Sun
  • 16. Where We Are: (1) Positive #ChangeAgents Need Flak Jackets (2) Cyber-Resiliency & Our Exponential Era (3) Three Cyber-Resiliency Axioms for Any Leader (4) Cyber-Resiliency 101 & 201 (5) Light & Dark Sides of Exponential Trends (6) Cyber-Resiliency 301 & 401 (7) Rapid “Graduate Course” on Coming Trends (8) Why This All Matters
  • 17. Cyber-Resiliency Axiom #1: Leadership vs. Management if all you do is only manage expectations, you will fall behind in a changing world à need #ChangeAgents to go beyond “status quo”
  • 18. Cyber-Resiliency Axiom #2: The Current TCP/IP Stack is Easier to Exploit vs. Harder to Defend right now it much easier to launch cyber exploits than prevent them à computer scientists & engineers know this, yet most lawyers & policymakers don’t
  • 19. Cyber-Resiliency Axiom #3: The Moment Resiliency & Security are Jobs of Only One Division, You’ve Lost greatest risks for exploits span how your organization operates, including what people are: (1) to do, (2) not to do, (3) not to forget to do
  • 20. Cyber-Resiliency is More than Just Cybersecurity It’s Risk Management no one would claim they’d never get sick, so to nothing ever 100% secure – we can strive for: (1) prevention, (2) early detection, (3) rapid mitigation
  • 21. Cyber-Resiliency is More than Just Cybersecurity It’s Risk Management 1500s = physical parameter defense is outdated 2010 = digital parameter defense is outdated
  • 22. Improving Cyber-Resiliency 101: Good “Organizational Hygiene” Fundamentals follow the Australian Signals Directorate’s “Top 8” = solid foundation for a rapidly changing world + if you want extra credit, can do the SANS 20 85% of Incidents Occur When Someone Does Not Do One of “Top 8”
  • 23. Cyber-Resiliency 101: Australian Signals Directorate’s 1st Part of the “Top 8” Prevent Malware Infections 1. Application Whitelisting 2. Patch Applications 3. Disable untrusted macros 4. Harden user apps
  • 24. Cyber-Resiliency 101: Australian Signals Directorate’s 2nd Part of the “Top 8” Limit Extent of Any Incident 5. Reduce Admin Privileges 6. Patch Op. Systems 7. Use Multi-Factor Logons 8. Backup Vital Data Daily
  • 25.
  • 26. Improving Cyber-Resiliency 201: A Choice of Two Paths the blue pill: document 100+ compliance security checks – yet still get undone by a new zero-day or novel social engineering exploit
  • 27. the blue pill: document 100+ compliance security as cyber tools improve at bottom of Open Systems Interconnection OSI Model, exploits are moving up layers
  • 28. the blue pill: document 100+ compliance security as cyber tools improve at bottom of Open Systems Interconnection OSI Model, exploits are moving up layers
  • 29. Improving Cyber-Resiliency 201: A Choice of Two Paths the red pill: change the game, strengthen controls around (1) digital identities, (2) vital data, and (3) processes tying data access to digital identities
  • 30. Improving Cyber-Resiliency 201: A Choice of Two Paths the red pill: change the game, strengthen controls avoid system-wide data access rights, don’t become a tempting one-stop “databank”
  • 31. digital identity controls w/ single sign-on = view behaviors across systems, time, & geography data access controls w/ granular access = limit view or edit rights to specific digital identities perform immutable audits of access tied to identity monitor for intrusion or insider threat behaviors & establish “patterns of life” intervene if non-normal
  • 33. Where We Are: (1) Positive #ChangeAgents Need Flak Jackets (2) Cyber-Resiliency & Our Exponential Era (3) Three Cyber-Resiliency Axioms for Any Leader (4) Cyber-Resiliency 101 & 201 (5) Light & Dark Sides of Exponential Trends (6) Cyber-Resiliency 301 & 401 (7) Rapid “Graduate Course” on Coming Trends (8) Why This All Matters
  • 34. Confront An Average Internet Minute: Light Side 204,000,000+ emails sent globally 4,000,000+ Google search queries 2,460,000+ pieces of Facebook content shared 72+ hours of new YouTube video uploaded 48,000+ iOS apps downloaded _____________________________________________ stats will grow exponentially in the years ahead
  • 35. Confront An Average Internet Minute: Dark Side McAfee: 200+ new threat vectors/minute FireEye: new malware every 3 mins DOE/NNSA: receives 6,940+ attacks/min DoD: 85% of emails received = spam and receives 13,800+ nefarious emails/minute _____________________________________________ stats will grow exponentially in the years ahead
  • 36.
  • 37.
  • 38. Improving Cyber-Resiliency 301: Simplify, Automate, Verify! (1) get off legacy IT and focus on doing your own IT only when you must (2) automate wherever you can (3) regularity re-verify whatever you trust
  • 39. Improving Cyber-Resiliency 301: Simplify, Automate, Verify! (1) get off legacy IT and focus on doing your own IT only when you must à embrace Software as a Service simplify, simplify, simplify what you must maintain
  • 40. Improving Cyber-Resiliency 301: Simplify, Automate, Verify! (2) automate wherever you can à automate any required patching, image rebuilds, and monitoring of identity access & data flow behavioral patterns Stop Manually Patching Wherever Possible!
  • 41. Improving Cyber-Resiliency 301: Simplify, Automate, Verify! (3) regularity re-verify whatever you trust à are humans, systems, and automated monitors operating as intended? use independent testing to confirm Verify What You (Have To) Trust
  • 42. Improving Cyber-Resiliency 401: Assume You Cannot Trust Even Your Hardware Meltdown = attacker "melts" security boundaries normally enforced by hardware can gain access to data that program shouldn't normally be able to see, including Admin-only data
  • 43. Improving Cyber-Resiliency 401: Assume You Cannot Trust Even Your Hardware Spectre = attacker make a program reveal data that should have been kept secret exploits "speculative execution" branches multiple variations & trickier to patch; will be haunting us for some time
  • 44. Improving Cyber-Resiliency 401: Embrace the Exponential Future Be Nimble! (Because the Attackers Will Be Too) present a changing “attack surface”, use ambiguity to your advantage à make it hard to recon your digital enterprise
  • 45. Improving Cyber-Resiliency 401: Embrace the Exponential Future Attackers Not Just Taking Data, Now Destroying Data orgs need to bounce back much faster than before from a destructive event à entire org needs to plan + deploy IT + train everyone with this in mind
  • 47. Where We Are: (1) Positive #ChangeAgents Need Flak Jackets (2) Cyber-Resiliency & Our Exponential Era (3) Three Cyber-Resiliency Axioms for Any Leader (4) Cyber-Resiliency 101 & 201 (5) Light & Dark Sides of Exponential Trends (6) Cyber-Resiliency 301 & 401 (7) Rapid “Graduate Course” on Coming Trends (8) Why This All Matters
  • 48. Rapid “Graduate Course” on Coming Trends (1) Machine-Learning & AI Challenges smart algorithms can be fooled with noise added
  • 49. Rapid “Graduate Course” on Coming Trends (1) Machine-Learning & AI Challenges
  • 50. Rapid “Graduate Course” on Coming Trends (2) Broader Definition of “Cybersecurity” organizations could do everything right regarding digital security and still loose trust overall
  • 51. Rapid “Graduate Course” on Coming Trends (2) Broader Definition of “Cybersecurity”
  • 52. Rapid “Graduate Course” on Coming Trends (3) Internet of Everything = Looming Train wreck? the IoE could amplify potential “attack surface” with billions of devices that are never patched
  • 53. Rapid “Graduate Course” on Coming Trends (3) Internet of Everything = Looming Train wreck? the IoE could be billions of devices easy to turn into digital zombies à who will notify individuals if their refrigerator or thermostat is compromised?
  • 54. Rapid “Graduate Course” on Coming Trends (4) Potential Quantum Advances in a Decade quantum computing allows accelerated factorization of encryption keys à orgs with sensitive data may want to consider quantum-resistant algorithms now?
  • 55. Rapid “Graduate Course” on Coming Trends (4) Potential Quantum Advances in a Decade quantum entanglement, if achieved over distances, allows “spooky actions at a distance” for unique secure communications properties
  • 56. Rapid “Graduate Course” on Coming Trends (5) Boards Start to Require Deep Cyber Expertise? presently, most board members not expected to go deep on cyber-resiliency in the same way they would on a profit and loss sheet à orgs not served well
  • 57. Rapid “Graduate Course” on Coming Trends (5) Boards Start to Require Deep Cyber Expertise? boards and other oversight mechanisms better served if members expected to be able to go deep on cyber-resiliency
  • 58. Rapid “Graduate Course” on Coming Trends (6) General Data Protection Regulation In Europe goes into effect in May 2018, has requirements for data breach notification and penalties for all firms processing EU data
  • 59. Rapid “Graduate Course” on Coming Trends (6) General Data Protection Regulation In Europe GDPR also has impacts for individual consent for sharing any personally identifiable information, including IP addresses .
  • 60. Rapid “Graduate Course” on Coming Trends (7) New Forms of Organizing to Address Resiliency growing interest to develop new approaches to decentralized data to allow individual’s to choose with whom (and when) they share personal data
  • 61. Rapid “Graduate Course” on Coming Trends (7) New Forms of Organizing to Address Resiliency potential need to develop cyber epidemiology preventive and response approaches to “infection control” across herds of digital devices
  • 62. Carl Sagan in 1994: Look again at that dot. That's here. That's home.
  • 63. That's us. On it everyone you love, everyone you know – Everyone you ever heard of, every human being who ever was, lived out their lives.
  • 64. To me, it underscores our responsibility to deal more kindly with one another – And to preserve and cherish the pale blue dot, the only home we've ever known.
  • 66. Positive #ChangeAgents Needed Now More Than Ever onwards and upwards together + thank you