SlideShare a Scribd company logo
CYBER SECURITY
INNOVATION
AN URGENT CALL FOR
CYBER HEROS
ME
Co-founder -> Cyber Security Hub – Barcelona
Founder and VP Engineering -> Innovating: Crime and
fraud detection/prevention platform
Managing Director -> Helping to find the most disruptive
Cyber Security startups
Carlos Valderrama
Over 15 years in Cyber Security, Computer
Forensics and Cyber Intelligence
CURRENT SITUATION
What’s happening out there?
Cyber Security Incidents reported to the U.S. CERT
CURRENT SITUATION
CURRENT SITUATION
ATMs, POS, Banking Trojans, contactless pickpockets,
etc, etc, etc.
CURRENT SITUATION
It’s clear that the security procedures utilized by companies today (big and small) is
completely failing and with the huge growth of IoT products (from smart fridges to
Barbie dolls) of which many are  buggy from the factory,  criminals are not
only compromising our data but also that of our family
CURRENT SITUATION
IoT devices
CURRENT SITUATION
•  Marketing
•  State-sponsored
•  Competitiveness
•  Crime/Terrorism
Privacy and Cyber Espionage
CURRENT SITUATION
CURRENT SITUATION
Air traffic control systems, railways, power stations, water plants, cars, etc, etc.
Terrorism
Cyber terrorism
CURRENT SITUATION
“Premeditated, politically motivated attack against information, computer systems,
computer programs, and data which results in violence against non-combatant
targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of Investigation
Crypto War 2.0 - Apple Case
CURRENT SITUATION
We have great respect for the professionals at the FBI, and we believe their intentions
are good. Up to this point, we have done everything that is both within our power and
within the law to help them. But now the U.S. government has asked us for something
we simply do not have, and something we consider too dangerous to create. They
have asked us to build a backdoor to the iPhone.
REAL TIME ATTACKS
The battle
CURRENT SITUATION
Why are the bad guys winning?
CURRENT SITUATION
CURRENT MODEL
New challenges, old methods
CURRENT MODEL
•  Complexity is the enemy of security
•  Complexity is expensive
•  Simplicity is the ultimate sophistication – Leonardo Davinci
•  Simplicity is the complexity resolved – Constantin Brancusi
CYBER SECURITY DISRUPTION
Digital disruption
CYBER SECURITY DISRUPTION
You know the Cyber Security Disruption is not happening when…
•  Telco providers
•  Power plants
•  Banks
•  Computers
•  Smartphones
•  Pacemakers
•  Email providers
•  Browsers
•  Operating Systems
•  Social Networks
•  Cars
•  Drones
•  …
Everyone and everything is getting
hacked!
We can’t detect it and prevent it
>
>
CYBER SECURITY
Innovation is the answer
CYBER SECURITY
Companies
Corporate network,
corporate servers and
computers, Internet Services,
Internet of Things, Online
Banking, BYOD, Online
Services
Citizens
Internet of Things, Personal
computers, Online services,
Cars, Smart city technology,
Mobile phones, Apps,
Internet Services, Online
Banking, Drones
Government
Government network,
Government servers and
computers, Government
data, Public records,
eGovernment, Online
services, International affairs
Public
Infrastructure
Critical infrastructure, smart
cities, Cars, Internet of
Things and connected
devices, traffic lights,
Security Cameras, Public
transport infrastructure
CYBER SECURITY
THE MARKET
Cyber Security
WHY CYBER SECURTIY?
“In 2014 venture capitalists
invested a record amount in
privately held companies in the
Cyber Security industry“
“In 2014, companies reported
42.8 million detected attacks
worldwide, a 48% YoY increase”
“The Cyber Security
Market will be worth
$170.21 Billion by 2020”
“$3.3 billion invested in Cyber
Security by VCs in 2015 – VCs
chasing Rising Cyber Security
Spending”
“Cyber Security startup
Tanium raising new VC at $2.5
billion valuation”
“Investors are pouring billions
into Cyber Security firms”
THE MOVERS & SHAKERS
Some of the leading European startups making a change in the
Cyber Security sector
Makers of the
Blackphone. Silent Circle
provides multiplatform
secure communication
services for mobile
devices and desktop
Develops continuous
authentication and
verification technology
that provides identity
and access
management solutions
The easy browser
extension that hides
your IP address,
encrypts your traffic and
protects your privacy	
Scytl develops secure
electronic voting and
electoral modernization
solutions for the public
and private sectors
Telegram is a cloud-
based instant messaging
service.
Telegram messages are
heavily encrypted and
can self-destruct
The world leader in
Enterprise Immune
System technology for
cyber security
Silobreaker is a data
analytics company
specialising in cyber
security and risk
intelligence.
Provides cyber
situational awareness
that helps organizations
protect against cyber
attacks and loss of
intellectual property
THE MAP
For more detail, the table can be found here.
BIG CYBER SECURITY EXITS
INVESTMENT HISTORY
INVESTMENT HISTORY
SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber
security across the U.S. government, an increase of $5 billion over this year
(REUTERS)
THE NECESSITY
Players
THE BIG PICTURE
University/Education
Government
Niche Investors/
Accelerators
Startups
Corporations
Cyber Security
Community
Women
Men
CYBER HEROES NEEDED
Lean startup Fellow founders
Funding Legal
Sales
Marketing/Growth
Hacking
Cyber Security Operations
CYBER HEROES NEEDED
JOIN US
We want you!
THANK YOU!
carlos@hackcradle.com

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
Darkweb
DarkwebDarkweb
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
DESTROYER39
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Ethical hacking
Ethical hacking Ethical hacking
Essential cybersecurity controls $
Essential cybersecurity controls $Essential cybersecurity controls $
Essential cybersecurity controls $
ssuser887866
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber security
Cyber securityCyber security
Cyber security
Sajid Hasan
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
engineermaste solution
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Darkweb
DarkwebDarkweb
Darkweb
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Essential cybersecurity controls $
Essential cybersecurity controls $Essential cybersecurity controls $
Essential cybersecurity controls $
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 

Viewers also liked

Infosecurity russia 2015
Infosecurity russia 2015Infosecurity russia 2015
Infosecurity russia 2015
Sergey Khodakov
 
Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015
Sergey Khodakov
 
Skolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentationSkolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentation
Sergey Khodakov
 
Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016
Sergey Khodakov
 
Creating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovoCreating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovo
Sergey Khodakov
 
Skolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_execSkolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_exec
Sergey Khodakov
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
Accenture Operations
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
Dr David Probert
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 

Viewers also liked (10)

Infosecurity russia 2015
Infosecurity russia 2015Infosecurity russia 2015
Infosecurity russia 2015
 
Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015
 
Skolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentationSkolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentation
 
Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016
 
Creating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovoCreating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovo
 
Skolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_execSkolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_exec
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 

Similar to [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM

Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
Harsh Kumar
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech Simplified
iHashmi ...
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
OCTF Industry Engagement
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
Brad Deflin
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
santhoshyadav23
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
Morgan Jones
 
188
188188
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Francesca Valente
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 

Similar to [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM (20)

Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech Simplified
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
188
188188
188
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM

  • 1. CYBER SECURITY INNOVATION AN URGENT CALL FOR CYBER HEROS
  • 2. ME Co-founder -> Cyber Security Hub – Barcelona Founder and VP Engineering -> Innovating: Crime and fraud detection/prevention platform Managing Director -> Helping to find the most disruptive Cyber Security startups Carlos Valderrama Over 15 years in Cyber Security, Computer Forensics and Cyber Intelligence
  • 4. Cyber Security Incidents reported to the U.S. CERT CURRENT SITUATION
  • 6. ATMs, POS, Banking Trojans, contactless pickpockets, etc, etc, etc. CURRENT SITUATION
  • 7. It’s clear that the security procedures utilized by companies today (big and small) is completely failing and with the huge growth of IoT products (from smart fridges to Barbie dolls) of which many are  buggy from the factory,  criminals are not only compromising our data but also that of our family CURRENT SITUATION
  • 9. •  Marketing •  State-sponsored •  Competitiveness •  Crime/Terrorism Privacy and Cyber Espionage CURRENT SITUATION
  • 10. CURRENT SITUATION Air traffic control systems, railways, power stations, water plants, cars, etc, etc. Terrorism
  • 11. Cyber terrorism CURRENT SITUATION “Premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents." U.S. Federal Bureau of Investigation
  • 12. Crypto War 2.0 - Apple Case CURRENT SITUATION We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
  • 15. Why are the bad guys winning? CURRENT SITUATION
  • 17. CURRENT MODEL •  Complexity is the enemy of security •  Complexity is expensive •  Simplicity is the ultimate sophistication – Leonardo Davinci •  Simplicity is the complexity resolved – Constantin Brancusi
  • 19. CYBER SECURITY DISRUPTION You know the Cyber Security Disruption is not happening when… •  Telco providers •  Power plants •  Banks •  Computers •  Smartphones •  Pacemakers •  Email providers •  Browsers •  Operating Systems •  Social Networks •  Cars •  Drones •  … Everyone and everything is getting hacked! We can’t detect it and prevent it > >
  • 21. CYBER SECURITY Companies Corporate network, corporate servers and computers, Internet Services, Internet of Things, Online Banking, BYOD, Online Services Citizens Internet of Things, Personal computers, Online services, Cars, Smart city technology, Mobile phones, Apps, Internet Services, Online Banking, Drones Government Government network, Government servers and computers, Government data, Public records, eGovernment, Online services, International affairs Public Infrastructure Critical infrastructure, smart cities, Cars, Internet of Things and connected devices, traffic lights, Security Cameras, Public transport infrastructure CYBER SECURITY
  • 23. WHY CYBER SECURTIY? “In 2014 venture capitalists invested a record amount in privately held companies in the Cyber Security industry“ “In 2014, companies reported 42.8 million detected attacks worldwide, a 48% YoY increase” “The Cyber Security Market will be worth $170.21 Billion by 2020” “$3.3 billion invested in Cyber Security by VCs in 2015 – VCs chasing Rising Cyber Security Spending” “Cyber Security startup Tanium raising new VC at $2.5 billion valuation” “Investors are pouring billions into Cyber Security firms”
  • 24. THE MOVERS & SHAKERS Some of the leading European startups making a change in the Cyber Security sector Makers of the Blackphone. Silent Circle provides multiplatform secure communication services for mobile devices and desktop Develops continuous authentication and verification technology that provides identity and access management solutions The easy browser extension that hides your IP address, encrypts your traffic and protects your privacy Scytl develops secure electronic voting and electoral modernization solutions for the public and private sectors Telegram is a cloud- based instant messaging service. Telegram messages are heavily encrypted and can self-destruct The world leader in Enterprise Immune System technology for cyber security Silobreaker is a data analytics company specialising in cyber security and risk intelligence. Provides cyber situational awareness that helps organizations protect against cyber attacks and loss of intellectual property
  • 25. THE MAP For more detail, the table can be found here.
  • 29. SPENDING HISTORY In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year (REUTERS)
  • 31. THE BIG PICTURE University/Education Government Niche Investors/ Accelerators Startups Corporations Cyber Security Community Women Men
  • 32. CYBER HEROES NEEDED Lean startup Fellow founders Funding Legal Sales Marketing/Growth Hacking Cyber Security Operations