2. Cyber Security:
A Common Problem
Can you afford to be scared to do something
when it comes to cybersecurity?
In a world where our personal data is a currency of trust, the risk of not putting your investment in your
customers’ private information can cost you your hard-earned reputation. New technologies present great
opportunities for businesses to evolve. Opportunists with an appetite for cyber chaos are primed to take
advantage of the weaknesses in your cybersecurity strategy.
3. Agenda
− 13:20 Welcome & Introduction
− 13:30 Che Smith
− 14:15 Refreshment Break
− 14:30 Tom Kendrick
− 15:15 Q&A
− 15:30 Networking Drinks
5. intercity.technology
An Epic Fail Story
The ironic adventure
of the veiled
lodger
Final
Reflections
Checkpoint
the role of AI
in Cyber
Security
What would
Trump do?
Introducing
Intercity
The Nine
Circles of
Security Hell
Today’s Agenda
6. A Cyber Security Epic Fail
The ironic adventure of the veiled lodger
Employs
1.9 million
Employs
1.7 million
2015 figures
“Ransomware is
unique among
cybercrime because in
order for the attack to
be successful, it
requires the victim to
become a willing
accomplice after the
fact”
James Scott, Sr. Fellow, Institute for
Critical Infrastructure Technology
7. Wide Area
Networking and
foundation voice
environments
IaaS Hosting and Data Centre services that
includes Storage, Hybrid Cloud and
Dedicated Bare Metal services,
All services come
with the M4
Service wrap;
• Maintained
• Monitored
• Management
• Managed
Service Desk
Local Area Networking -
Designing, Installing, Testing and
Refreshing.
A managed, cloud-based, next-generation
firewall service. Dedicated instances and
shared environments available.
Technology reviews, strategic support,
network audits, network readiness
assessments, vulnerability scanning,
Penetration testing & Managed Service Desks
The Intercity Story
Exploit and Explore
A Managed service
provider putting
people first
8. intercity.technology
If Trump was running
your security he would
do it “bigly”
Bigly Covfefe
Bad
Hombre
Extreme
Vetting
Taking the
shackles
off
I’m gonna’
build a wall
Fake News
Don’t be a
snowflake
Alternative
Facts
Small
Hands
What would Trump say?
9. Cybersecurity Ventures predicts that a
business will fall victim to a ransomware
attack every 14 seconds by 2019
The average amount demanded after a
ransomware attack is $1,077
Cyber Security: A
common problem
I’m gonna’
build a wall
11. intercity.technology
Only 38 percent of global organizations
claim they are prepared to handle a
sophisticated cyber attack.
Don’t be a
snowflake
Global Cybersecurity Status Report” | ISACA International
Cyber Security: A
common problem
12. intercity.technology
80% of senior decision makers
say security is hindering innovation
Alternative facts
Security VS Innovation – DisruptionHub 2018
Cyber Security: A
common problem
13. intercity.technology
The percentage of Security people
in comparison to IT people is not
growing as fast as it should be.
Small hands
Forbes
Cyber Security: A
common problem
14. intercity.technology
“Cyber crime is the greatest threat to
every company in the world.”
Ginni Rometty
Bigly
IBM
Cyber Security: A
common problem
15. intercity.technology
$75.2 billion: Amount that
organizations worldwide will spend
on infrastructure protection and
security services in 2018
Covfefe
Gartner December 7, 2017
Cyber Security: A
common problem
18. intercity.technology
Employee training may prove to
be the best ROI on cybersecurity
investments for organizations
globally over the next 5 years
Taking the
shackles off
CCS Insight
Cyber Security: A
common problem
19. The journey to “security hell”
is paved with good intentions
1. Limbo
Do nothing except bury your head in the sand
and I am sure everything will be OK.
2. Lust
Continually lusting after other organisations’
security solutions.
3. Gluttony
Gorging on freebie security solutions
whilst disregarding real protection.
4. Greed
Taking in as many solutions as you possibly can
and creating management chaos.
5. Anger
Getting angry with the perpetrators and taking
your eye off the prize.
6. Heresy
Not believing the advice from
the experts.
7. Violence
Continuously breaking up what you
have built and starting again.
8. Fraud
Pretending you know what you
are doing.
9. Treachery
Sometimes the greatest threat
comes from within.
20. 2) Surround yourself with experts that can create layers of next
generation defenses around your critical infrastructure.
1) Is it time to move your Security to the Cloud?
5) Come and talk to Intercity Technology
3) Don’t Stand Still
4) Don’t Forget the Basics
Final Reflections
22. “The development of
full
artificial intelligence
could spell the end
of the human race.”Stephen
Hawking
“Computers are
going to take over
from humans, no
question.”
Steve
Wozniak
“AI will be the
most likely cause
of WW3”Elon
Musk
“Country that leads in
AI development will be
the ruler of the world”
Vladimir
Putin
EVERYBODY
IS TALKING
ABOUT AI
37. KEY PROBLEMS WITH CYBER SECURITY AI
Not Enough Not EnoughDATA EXPERTISE
Access to cyber security training data is
limited
Verdict logic is obscure
High false detection rate
43. CONTEXT
AWARE
DETECTION
“CADET”
Look at the full context of the
inspected element
Extract parameters from the
environment
THOUSAND
S
of discrete
Indicators
ONE
Accurate
Verdict
Missed Detection False Positive
Old CADET
2-fold
10-fold
44. So what have we learned?
• There are new techniques and attacks developing
• Basic protections cover the simple attacks very well!
• Most IT Professionals are not skilled enough in advanced
analysis
• Security solutions, assisted by Automation and AI let us
have that expert analyst anywhere our data may be
• AI is not perfect, but it helps!
SUMMARY