SlideShare a Scribd company logo
* 21* 21ststC Cybersecurity Trends (1) *C Cybersecurity Trends (1) *
“Integrated Security”“Integrated Security”
1
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Integrated Security”“Integrated Security”
-- Securing the Internet of ThingsSecuring the Internet of Things ––
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail and AliceAbigail and Alice -- To Their Secure Future!To Their Secure Future!
**21stC кибербезопасности Тенденции (1)*21stC кибербезопасности Тенденции (1)*
интегрированная безопасностьинтегрированная безопасность
-- ЗащитаЗащита Интернет вещейИнтернет вещей --
2
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
-- ЗащитаЗащита Интернет вещейИнтернет вещей --
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail and AliceAbigail and Alice -- To Their Secure Future!To Their Secure Future!
Cybersecurity TrendsCybersecurity Trends –– “Dual Themes”“Dual Themes”
Theme (1)Theme (1) –– “Integrated Cyber“Integrated Cyber--Physical Security:Physical Security: Securing the Internet of Things”Securing the Internet of Things”
-- TOTAL Security now requires Integration of CyberTOTAL Security now requires Integration of Cyber--Physical OperationsPhysical Operations
-- Recommendation for Board Level CSO to manage TOTAL Security OpsRecommendation for Board Level CSO to manage TOTAL Security Ops
-- Emergence of the “INTERNET of THINGS” as Future CyberEmergence of the “INTERNET of THINGS” as Future Cyber--Conflict ZoneConflict Zone
“Integration”:“Integration”: “TOTAL Extended Enterprise Security”“TOTAL Extended Enterprise Security” 09:0009:00 -- 2727thth Oct 2015Oct 2015
3
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
ThemeTheme (2)(2) –– “Advanced Cybersecurity:“Advanced Cybersecurity: Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning”
-- Transition from 20Transition from 20ththC Security to Hybrid AIC Security to Hybrid AI--Based 21Based 21ststC Cyber ModelsC Cyber Models
-- Using AI & Machine Learning to protect your Enterprise OperationsUsing AI & Machine Learning to protect your Enterprise Operations
-- Developing YOUR Action Plans for Advanced Cybersecurity Solutions!Developing YOUR Action Plans for Advanced Cybersecurity Solutions!
“Intelligence”:“Intelligence”: ”Real”Real--Time SelfTime Self--Adaptive Cybersecurity”Adaptive Cybersecurity” 11:1511:15 –– 2727thth Oct 2015Oct 2015
Download SlideDownload Slides:s: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
5
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Global IPv4 Internet Servers:Global IPv4 Internet Servers: 24/724/7
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
11 –– Background:Background: “21sr Security Landscape”“21sr Security Landscape” 2 – Cybersecurity: Players & Threats 3 – Cyber-Physical Threat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
6
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 –YOUR TOP 10 Actions & RoadMap
Background:Background: 2121ststC Security LandscapeC Security Landscape
• Convergence of Physical & Cybersecurity Ops
• “Cyber” migrates from IT Dept to Main Board
• Global Real-Time Targeted Cyber Attacks – 24/7
• Transition from 20thC Tools (Firewalls & Anti-
7
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
• Transition from 20thC Tools (Firewalls & Anti-
virus) to 21stC Tools (AI & Machine Learning)
• Emergence of Corporate “Internet of Things”
• Evolution of Smart Devices, Cities & Economy
• Dramatic increase in Cybercrime & CyberTerror
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 20 Year20 Year Evolution ofEvolution of CyberCrimeCyberCrime && CyberTerrorCyberTerror:: 19951995--20152015
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
8
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security Risks:High Security Risks: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
Friday 23Friday 23rdrd Oct 2015Oct 2015
9
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Major CyberMajor Cyber--Attack UK Internet Service ProviderAttack UK Internet Service Provider
Typical GlobalTypical Global“Botnet”“Botnet” Cyber AttackCyber Attack
10
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
11
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility
Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers
-- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” --
12
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
UN/ITUUN/ITU –– Global Cybersecurity Index (Dec 2014)Global Cybersecurity Index (Dec 2014)
13
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Typical C2Typical C2
MalwareMalware
SignaturesSignatures
14
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
SignaturesSignatures
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
““Visualisation of Cyberspace”:Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
15
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
…From 20…From 20ththC Physical World To 21C Physical World To 21ststC Cyberspace! ...C Cyberspace! ...
Map ofMap of RecentRecent Malicious Activity inMalicious Activity in “Cyberspace”“Cyberspace”
16
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
www.team-cymru.org : - Malicious Activity over 30 daysMalicious Activity over 30 days -- Sept 2014Sept 2014
Contrast between our Physical & Cyber WorldsContrast between our Physical & Cyber Worlds
Convergence to 21Convergence to 21ststC “Intelligent Worlds” will take time!C “Intelligent Worlds” will take time!
Physical World = “Space”Physical World = “Space”
• Top-Down
• Dynamic
• Secrecy
• Territorial – “Geographical Space”
• Government Power
• Control
• Direct
Cyber World = “Time”Cyber World = “Time”
• Bottom-Up
• Self-Organising
• Transparency
• Global – “Real-Time”
• Citizen Power
• Freedom
• Proxy
17
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
• Direct
• Padlocks & Keys
• Convergent
• Hierarchical
• Carbon Life
• Tanks & Missiles
• Mass Media
• Proxy
• Passwords & Pins
• Divergent
• Organic
• Silicon Life
• Cyber Weapons & “Botnets”
• Social Media
“Smart Security” will require Embedded Networked Intelligence in ALL future IoT devices“Smart Security” will require Embedded Networked Intelligence in ALL future IoT devices
Smart 3D Network Modelling:Smart 3D Network Modelling: HyperglanceHyperglance
18
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Hyperglance RealHyperglance Real--Time IT Modelling & Visualisation SoftwareTime IT Modelling & Visualisation Software -- Intergence.ComIntergence.Com -- Cambridge, UKCambridge, UK
1 – Background: “21stC Security Landscape” 22 –– CybersecurityCybersecurity :Players and Targets:Players and Targets 3 – Cyber-Physical Threat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
19
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
Cybersecurity:Cybersecurity: Players and TargetsPlayers and Targets
•• “Bad Guys Threats”:“Bad Guys Threats”: Cyber-Criminals, Cyber-
Terrorists, Political Activists, Cyber-Espionage.
•• “Good Guy Targets”:“Good Guy Targets”: Critical Information Sectors
– Financial Services, Government, Military,
20
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
– Financial Services, Government, Military,
Energy, Transportation, Telecommunications,
Social Media, Healthcare, Education......
......TargetsTargets are often high-traffic websites with
massive databases of financial & political interest
– such as Banks, Social Media & Government
CyberCrimeCyberCrime, CyberTerrorism & Espionage, CyberTerrorism & Espionage
•• Profit:Profit: Cybercrime is generally for commercial gain and
profit with focus on Financial Service Sector. It is now
carried out on an “Industrial Scale” by IT Technically
skilled criminal specialists as Global eCrime Business!
•• Power:Power: CyberTerror by Groups such as ISIS is executed
to assert their “power”, develop their “brand” as well
21
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
to assert their “power”, develop their “brand” as well
as to attract new “followers” through social media.
•• Espionage:Espionage: CyberEspionage Groups are now emerging
to penetrate both commercial, government and
military organisations around the globe.
Main Cyber Players and their MotivesMain Cyber Players and their Motives
•• CyberCriminalsCyberCriminals:: Seeking commercial gain from hacking
banks & financial institutions as well a phishing scams
& computer ransomware
•• CyberTerroristsCyberTerrorists:: Mission to penetrate & attack critical
assets, and national infrastructure for aims relating to
political power & “branding”
•• CyberEspionageCyberEspionage:: Using stealthy IT Malware to
22
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• CyberEspionageCyberEspionage:: Using stealthy IT Malware to
penetrate both corporate & military data servers in
order to obtain plans & intelligence
•• CyberHackivistsCyberHackivists:: Groups such as “Anonymous” with
Political Agendas that hack sites & servers to virally
communicate the “message” for specific campaigns
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 33 –– CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
23
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
CyberCyber--Physical Threat ScenariosPhysical Threat Scenarios
•• Physical “Penetration”:Physical “Penetration”: Operations Perimeter
penetrated to allow theft or corruption of Cyber
Information / IT DataBases and Confidential Plans
•• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access
Controls & IT Databases to allow Criminals/Terrorists
24
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Controls & IT Databases to allow Criminals/Terrorists
to enter Target Facilities (such as Military Bases,
Banking HQ, Telco/Mobile Network Operations)
•• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack
at the weakest links which in the 21stC will be BOTH
Cyber Network Operations and Physical Security Ops
“Cyber to Physical Attacks”“Cyber to Physical Attacks”
• The illegal penetration of ICT systems may allow criminals to secure information or
“make deals” that facilities their real-world activities:
–– “Sleeping Cyber Bots”“Sleeping Cyber Bots” – These can be secretly implanted by skilled hackers to secure
on-line systems, and programmed to explore the directories & databases, and & then to
transmit certain information – Account & Credit Card Details, Plans, Projects, Deals
–– Destructive “Cyber Bots”Destructive “Cyber Bots” – If cyber-bots are implanted by terrorist agents within the
operational controls of power plants, airports, ports or telecomms facilities then
considerable physical damage may result. A simple “delete *.*” command for the root
directories would instantly wipe out all files unless the facility has real-time fail-over!
Distributed Denial of Service AttacksDistributed Denial of Service Attacks –
25
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
–– Distributed Denial of Service AttacksDistributed Denial of Service Attacks – These not only block access to system, but in
the case of a Banking ATM Network, means that the national ATM network has to be
closed. Alternatively in the case of an airline check-in and dispatch system, flights are
delayed.
–– NationalNational CyberAttacksCyberAttacks – Many international organisations such as NATO & US DOD
forecast that future regional conflicts will begin with massive cyberattacks to disable
their targets’ physical critical communications and information infrastructure (CNI)
Nations need to upgrade their national cybersecurity to minimise the risks of HybridHybrid
CyberCyber--Physical AttacksPhysical Attacks from terrorists, criminals, hacktivists and political adversaries
“Physical to Cyber Attacks”“Physical to Cyber Attacks”
• Most “physical to cyber attacks” involve staff, contractors or visitors performing criminal
activities in the “misuse of computer assets”:
–– Theft & Modification of ICT Assets:Theft & Modification of ICT Assets: It is now almost a daily occurrence for critical
information & databases to be either deliberately stolen or simply lost on PCs or Chips
–– Fake Maintenance Staff or ContractorsFake Maintenance Staff or Contractors: A relatively easy way for criminals to access
secure facilities, particularly in remote regions or developing countries is to fake their
personnel IDs and CVs as being legitimate ICT maintenance staff or contractors
26
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
personnel IDs and CVs as being legitimate ICT maintenance staff or contractors
–– Compromised Operations Staff:Compromised Operations Staff: Sometime operational ICT staff may be tempted by
criminal bribes, or possibly blackmailed into providing passwords, IDs & Access Codes.
–– Facility Guests and Visitors:Facility Guests and Visitors: It is standard procedure for guests & visitors to be
accompanied at all times in secure premises. In the absence of such procedures, criminals,
masquerading as guests or visitors, may install keylogger devices or extract information,
plans and databases to wireless enabled USB chips, tablets or phones!
RecentRecent CyberCyber Threats & Security FlawsThreats & Security Flaws
•• SHELLSHOCKSHELLSHOCK – Discovered 2424thth Sept 2014Sept 2014 – Security flaw in “Bash Software” that is
present in the Apple Mac OS X, Unix and Linux. Allows execution of malicious code that
could allow access to private data and remote control of server for orchestrated DDOS
“BOT” attacks to targeted victim networks.
27
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• HEARTBLEEDHEARTBLEED – Discovered April 2014April 2014 in OpenSSL Cryptography Library (widely used in
Transport Layer Security – TLS) as a buffer over-read security flaw. When exploited this
allows the theft of users private encryption “keys”, as well as passwords & session cookies
Commercialisation ofCommercialisation of “Cyber Toolkits”“Cyber Toolkits”
• Industrialisation and Mainstreaming of Cyber Attacks:
–– (1) Researchers & Cyber Software Creators of Malicious Codes(1) Researchers & Cyber Software Creators of Malicious Codes : Often creative
talented computer scientists that have turned their skills to tools for illegal
penetration & control of secure systems
–– (2) “Botnet”(2) “Botnet” -- Farmers & HerdersFarmers & Herders : They are responsible for the illegal
international distribution and infection of target “zombie” networked laptops
PCs & Servers within homes and offices. The malicious codes (malware such
as viruses & trojans) are spread through spam emails, infected websites and
28
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
as viruses & trojans) are spread through spam emails, infected websites and
“backdoor” attacks.
–– (3) “Commercial Botnet Dealers”(3) “Commercial Botnet Dealers” : They sell access to herds of “zombie”
infected machines. The embedded malicious code can be triggered to
stimulate “Denial of Service (DDoS)” attacks on target servers & websites.
The aim is usually to maximise economic and political damage upon the
targeted nation and associated businesses.
…..For further information see the ITU “BotNet” Mitigation Toolkit(2008)
Hybrid CyberHybrid Cyber--PhysicalPhysical HacktivismHacktivism
“Anonymous” Attacks on BART“Anonymous” Attacks on BART -- Aug 2011Aug 2011
Physical ProtestsPhysical Protests by International HacktivistHacktivist
Group – “Anonymous”“Anonymous” - coupled with multiple
Web-Site Cyber AttacksCyber Attacks following incident on
Bay Area Transit NetworkBay Area Transit Network -- BARTBART –– San FranciscoSan Francisco
29
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Historic” Cyber Attack Case Studies“Historic” Cyber Attack Case Studies
•• Estonia : May 2007Estonia : May 2007
– Targeted at Government & Banking Servers – and immobilised national & commercial economic
infrastructure for several days. This was one of the earliest “historic” massive DDos attacks
(Distributed Denial of Service) from unknown proxy sources.
•• Georgia : August 2008Georgia : August 2008
– Targeted at Government Servers including Parliament & Ministry of Foreign Affairs, and the
National & Commercial Banking Network from anonymous proxy sources.
•• South Korea : July 2009South Korea : July 2009
– Targets included the Defence Ministry, Presidential Offices, National Assembly, and Korea
Exchange Banks. This attack was also simultaneously targeted at various high-profile US Sites &
Servers such as the NY Stock Exchange, White House & Pentagon.
30
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Servers such as the NY Stock Exchange, White House & Pentagon.
•• Iran, Indonesia & India : June 2010Iran, Indonesia & India : June 2010
– Computer worm known as StuxnetStuxnet discovered in Industrial Logic Controllers in several countries
including Iran , Indonesia and India. Stuxnet was the 1st known sophisticated “Designer” Cyber
Malware targeted on specific industrial SCADA Systems (Supervisory Control And Data
Acquisition). Duqu Malware (2011) is related to Stuxnet.
•• Middle East : May 2012Middle East : May 2012
– Sophisticated Modular Computer Malware known as FlameFlame or Skywiper is discovered infecting
computer networks in Middle Eastern Countries including Iran, Saudi Arabia, Syria, Egypt,& Israel
…...…...Small scale penetrations & cyber attacks continue on an almost 24/7 against almostSmall scale penetrations & cyber attacks continue on an almost 24/7 against almost
ALL countries including government & critical national & industrial infrastructure (CNI)ALL countries including government & critical national & industrial infrastructure (CNI)
Growing NationalGrowing National CybersecurityCybersecurity FocusFocus
31
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cybersecurity Sector Plans:Cybersecurity Sector Plans: GovernmentGovernment
32
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia
33
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
44 ––Banking & Finance: Hybrid CybersecurityBanking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
34
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference34
44 ––Banking & Finance: Hybrid CybersecurityBanking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 –Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
CybersecurityCybersecurity Threats & Risks forThreats & Risks for
the Banking & Finance Sectorthe Banking & Finance Sector
35
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Banking & Finance:Banking & Finance: CyberCyber--Physical ThreatsPhysical Threats
•• Banks & Financial InstitutionsBanks & Financial Institutions are prime targets for Cybercriminals &
Cyberterrorists since they are at the heart of ALL National Economies!
•• AccessAccess to Accounts is usually indirect through phishing scams, infected
websites with malicious scripts, and personal ID Theft.
•• OnOn--Line bank transfersLine bank transfers are also commonly used for international money
laundering of funds secured from illegal activities
•• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the
classic “Advanced Fee Scam” as well as Lottery and Auction Scams
An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing
36
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
• An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing
•• National & Commercial BanksNational & Commercial Banks have also been targets of DDOS cyber
attacks from politically motivated and terrorist organisations
•• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will
receive penetration scans and attempted hacks on a regular basis.
•• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal
Banking are at the “sharp end” of financial security and require great
efforts towards end-user authentication & transaction network security
Cyber “Banking Theft”Cyber “Banking Theft”–– CarbanakCarbanak
37
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Estimated ~$1Billion stolen
from ~100+ Banks & Financial
Institutions during 2013/2014
Researched by “Researched by “KasperskyKaspersky Labs”Labs”
Cybercriminals TargetCybercriminals Target Major UK BankMajor UK Bank
38
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Process Flow ofProcess Flow of CyberCriminalCyberCriminal Attack onAttack on
Major UKMajor UK Financial InstitutionFinancial Institution: 2010: 2010
39
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Source: White Paper by M86 Security: Aug 2010
Such Cyber Attacks, with variations, take place regularly inSuch Cyber Attacks, with variations, take place regularly in Banking & Financial ServicesBanking & Financial Services
. During. During Summer 2014Summer 2014 more thanmore than 83Million Accounts83Million Accounts were “hacked” @were “hacked” @ JP Morgan ChaseJP Morgan Chase--
-- It is estimated that more thanIt is estimated that more than $450Bllion/Year$450Bllion/Year is lost throughis lost through CyberCrimeCyberCrime --
Cybersecurity forCybersecurity for Banking & FinanceBanking & Finance
40
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
41
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference41
4 –Banking & Finance: Hybrid Cybersecurity 55 –– CSO:CSO: Board Level Security IntegrationBoard Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 –Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
CSO:CSO: Board Level Security IntegrationBoard Level Security Integration
•• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security
managed with minimal common operations
•• 2121ststC CSO Model:C CSO Model: Business & Government
urgently need to manage TOTAL Cyber-
42
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
urgently need to manage TOTAL Cyber-
Physical Operations at C-Suite Board Level
•• Investment Plan:Investment Plan: CSOs need professional
team & Investment Budget to manage physical
& cyber security risks, threats and attacks!
TraditionalTraditional “Physical Security”“Physical Security” DefencesDefences
in the context of “Cybersecurity”in the context of “Cybersecurity”
•• Compliance:Compliance: Investments in establishing and upgrading cybersecurity defences against
cybercrime means that all physical security and associated operational staff should also be
reviewed for compliance with policies, and audited to international standards
•• Integration:Integration: Physical and Cybersecurity operations should be linked “step-by-step” at the
command and control level in the main government or enterprise operations centre.
•• Physical SecurityPhysical Security for critical service sectors such as governments, airports, banks,
43
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Physical SecurityPhysical Security for critical service sectors such as governments, airports, banks,
telecommunications, education, energy, healthcare and national defence should be included
within the strategy and policies for Cybersecurity and vice versa
•• Upgrades:Upgrades: In order to maximise security, Government and Businesses need to upgrade and
integrate resources & plans for both physical & cybersecurity during the next years.
•• Roadmap:Roadmap: I’d recommend developing a focused total security action plan and roadmap
(Physical & Cyber) for each critical sector within YOUR National Economy & Enterprises
Cyber:Cyber: Integrated Command & ControlIntegrated Command & Control
44
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Security Operations Command Centre for Global Security Solutions EnterpriseSecurity Operations Command Centre for Global Security Solutions Enterprise•• Security Operations Command Centre for Global Security Solutions EnterpriseSecurity Operations Command Centre for Global Security Solutions Enterprise
CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations
•• CybersecurityCybersecurity for Government, Business & Critical Service Sectors should be
tightly integrated with operational physical security solutions including:
1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities
2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Car Parking & Entrances
3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with physical CCTV & Alarm Control Centres
4)4) Personnel RFIDPersonnel RFID and/or biometrics office & campus access controls
5) Professionally trained security personnel & guardssecurity personnel & guards – 24/7 – for top security facilities
45
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
5) Professionally trained security personnel & guardssecurity personnel & guards – 24/7 – for top security facilities
6) Implemented facility security policysecurity policy for staff, visitors and contractors
7)7) Intelligent perimeterIntelligent perimeter security controls for campuses and critical service facilities such as
airports, power stations, refineries, military bases, hospitals and government institutions
8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities
9) Focus upon in-depth physical securityphysical security for computer server rooms, data storage & archives
All critical information infrastructures on multiAll critical information infrastructures on multi--building campus sites such as airports,building campus sites such as airports,
universities, hospitals, military bases, leisure resorts & government agencies requireuniversities, hospitals, military bases, leisure resorts & government agencies require
“Integrated 4D Cyber“Integrated 4D Cyber--Physical Security Operations”Physical Security Operations” = “SMART SECURITY”= “SMART SECURITY”
Critical Energy Industry Sector :Critical Energy Industry Sector : “Cybersecurity for“Cybersecurity for
Automated Industrial Control & Safety Systems”Automated Industrial Control & Safety Systems”
46
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Protection against “Stuxnet” type designer malware that attacks SCADA systemsProtection against “Stuxnet” type designer malware that attacks SCADA systems
Integration of Physical and Cyber SecurityIntegration of Physical and Cyber Security
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
47
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence in ALL DevicesEmbedded Intelligence in ALL Devices -- Internet of ThingsInternet of Things
Integrated Cyber & Physical Security:Integrated Cyber & Physical Security: “The Shopping List”“The Shopping List”
...Smart Security for Business & Government is a Multi...Smart Security for Business & Government is a Multi--Year Programme!Year Programme!
1)1) Cybersecurity TeamCybersecurity Team:: Establishment of a CERT/CSIRT & Professionally Qualified
Cybersecurity Team within your Business or Government Organisation
2)2) CNI:CNI: Long Term Critical Infrastructure Protection (CNI) – Protect Critical Info Assets!
3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware, Software,
Databases, Secure Network Links, Biometrics & RFID
4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems
5)5) PhysicalPhysical :: Physical Security Applications – CCTV, Alarms, Control Centre
6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness
48
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness
7)7) TrainingTraining:: Cybersecurity Skills, Certification & Professional Training Programme
8)8) EncryptionEncryption:: Implement Data Encryption for Business Critical Info
9)9) Rules & Policies:Rules & Policies: Develop and Communicate Cyber & Physical Security Policies for ALL
Staff & Contractors to cover topics such as Wi-Fi and “Bring your Own Device (BYOD)”
..….It is also recommended to develop an economic..….It is also recommended to develop an economic “Cost“Cost--Benefit”Benefit” analysis and detailedanalysis and detailed
Business Case in order to justifyBusiness Case in order to justify Cybersecurity InvestmentCybersecurity Investment for your Board of Directors!for your Board of Directors!
“Cyber“Cyber –– Physical Security Operations”Physical Security Operations”
Convergence to Smart Resilient Security SolutionsConvergence to Smart Resilient Security Solutions
•• IP Networks:IP Networks: Physical security and associated Operational Solutions are increasingly based upon
sophisticated electronic networked solutions, including biometrics, smart CCTV, intelligent perimeter
fences, embedded active & passive RFID Devices and networked real-time sensors
•• Convergence:Convergence: CSO-led Management operations for “Physical Security” and “Cybersecurity” will
steadily converge & become integrated during the next few years from staff, assets, resources &
operational budget perspectives = “Smart Resilient Security”“Smart Resilient Security”
•• Smart Security in 3 Phases:Smart Security in 3 Phases: Cyber-Physical Security Integration will evolve over 5 -10 years
49
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
•• Smart Security in 3 Phases:Smart Security in 3 Phases: Cyber-Physical Security Integration will evolve over 5 -10 years
11stst PhasePhase –– Virtual OperationalVirtual Operational IntegrationIntegration -- CSOCSO managed Security Teammanaged Security Team
22ndnd PhasePhase –– Integrated ArchitecturesIntegrated Architectures and Standardsand Standards –– ONEONE CyberCyber--Physical ModelPhysical Model
33rdrd PhasePhase –– Embedded IntelligentEmbedded Intelligent Integration ofIntegration of ALLALL DevicesDevices -- Internet of ThingsInternet of Things
•• Business Benefits:Business Benefits: The benefits of integrating cyber and physical security for both Business and
Governments are reduced running costs, reduced penetration risk, and increased early warning of co-
ordinated cyber-physical security attacks, whether from criminals, hackers or terrorists.
…...thethe “Cyber“Cyber--Vardzia”Vardzia” White Paper for Georgia discusses Cybersecurity andWhite Paper for Georgia discusses Cybersecurity and
Physical security in some depth, as well as their convergence and integration!Physical security in some depth, as well as their convergence and integration!
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 66 –– The Enterprise Internet of Things (IoT)The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
50
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 66 –– The Enterprise Internet of Things (IoT)The Enterprise Internet of Things (IoT)
7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
EnterpriseEnterprise “Internet of Things”“Internet of Things”-- IoTIoT
•• CyberCyber--Enterprise:Enterprise: During the next 5-10 years of
Cyber Evolution the Internet will extend to
practically ALL our IT enabled devices within cars,
homes, offices, power stations & retail products!
This is defined as the “Internet of Things” – IoT.
51
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
This is defined as the “Internet of Things” – IoT.
•• Extended Security:Extended Security: ALL IoT connected devices,
nodes & servers must be secured against attack!
•• CSO Challenge:CSO Challenge: The IoT is the next Cyber Conflict
Zone and Security Challenge for Enterprise CSOs!
“Internet of Things”:“Internet of Things”: Our DefinitionsOur Definitions
52
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution
53
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“IoT Devices”:“IoT Devices”: Wristbands and WatchesWristbands and Watches
54
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Google Car”:“Google Car”: Computer Vision ViewComputer Vision View
55
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM
56
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures
57
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors
58
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
59
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
60
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
77 –– CyberCyber--Physical Threats from the “IoT”Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
CyberCyber--PhysicalPhysical Threats from the “IoT”Threats from the “IoT”
•• ALL Networked DevicesALL Networked Devices are at risk from
Cyber-Hacking, Penetration and Remote
Control
•• IoT Devices:IoT Devices: Smart Phones, Home Controls,
Vehicles, Industrial Controls, Smart Cities,
61
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Vehicles, Industrial Controls, Smart Cities,
Power Stations, Utilities, Medical Devices.....
•• Legacy Assets:Legacy Assets: Many legacy assets including
cars, medical implants, industrial controls are
still inherently INSECURE against cyberattacks!
CybersecurityCybersecurity for Critical Sector Environmental Networks:for Critical Sector Environmental Networks: “Internet of Things”“Internet of Things”
Sensor Networks
62
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
63
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
64
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
65
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 –Cyber-Physical Threats from the “IoT” 88 –– Practical Solutions for “IoT” SecurityPractical Solutions for “IoT” Security 9 – YOUR TOP 10 Actions & RoadMap
PracticalPractical Security SolutionsSecurity Solutions for the “IoT”for the “IoT”
•• European UnionEuropean Union -- IERC:IERC: Extensive “IoT” research
during the last 5 years including security.
•• IEEE IoT Community, Journal & Conference :IEEE IoT Community, Journal & Conference :
Recent international focus upon IoT Security
66
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Recent international focus upon IoT Security
Standards and Engineering Practical Solutions.
•• Advanced Cyber Tools:Advanced Cyber Tools: Sustainable IoT Network
Security requires innovative 21stC Adaptive &
Self-learning tools based upon research into
Artificial Intelligence and Machine Learning.
Internet of Things:Internet of Things: Business AlliancesBusiness Alliances
67
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
IEEEIEEE World Forum:World Forum: “Internet of Things”“Internet of Things”
1414thth--1515thth December 2015December 2015 –– Milan, ItalyMilan, Italy
68
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture
69
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Reports: Securing theReports: Securing the “Internet of Things”“Internet of Things”
70
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Consultant Reports:Consultant Reports: Internet of ThingsInternet of Things
71
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Booz, Allen and HamiltonBooz, Allen and HamiltonErnst and Young Global LimitedErnst and Young Global Limited
Ernst and YoungErnst and Young Cybersecurity Reports(1)Cybersecurity Reports(1)
72
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Web: www.ey.com - Ernst & Young Global Limited
Ernst and YoungErnst and Young Cybersecurity Reports(2)Cybersecurity Reports(2)
73
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Web: www.ey.com - Ernst & Young Global Limited
Useful Publications onUseful Publications on ““Internet of Things”Internet of Things”
74
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
European Research Cluster:European Research Cluster: Internet of ThingsInternet of Things
75
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
IERCIERC –– Research Cluster Reports onResearch Cluster Reports on ““SmartSmart
Systems” & the Internet of ThingsSystems” & the Internet of Things
76
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
-- Security the Internet of ThingsSecurity the Internet of Things --
Security & Privacy inSecurity & Privacy in HyperconnectedHyperconnected SocietySociety
77
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Evolution ofEvolution of ”Cyber”Cyber--Physical”Physical” SolutionsSolutions
78
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT”
79
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
CyberCyber--PhysicalPhysical System Modules for “IoT”System Modules for “IoT”
80
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“IoT”:“IoT”: Communications StandardsCommunications Standards
81
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework
82
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture
83
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security”
84
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT)
7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 99 –– YOURYOUR TOP 10 Actions & RoadMapTOP 10 Actions & RoadMap
YOUR TOP 10YOUR TOP 10 Integrated Security ActionsIntegrated Security Actions
1) CSO – Chief Security Officer’s Team –1) CSO – Chief Security Officer’s Team –
Board Level Roles & Responsibilities
2) Professional Training – Suggest Top-
Level CISSP Certification for Team
3) Implement International Security
Standards (ISO/IEC- 27000)
4) Develop Professional CERT Team
6) ICT: Hire Qualified Cyber Systems6) ICT: Hire Qualified Cyber Systems
Technology, Software & Operations Team
7) Review Security Risks & Connectivity of ALL
Enterprise IP Legacy Assets & Devices (IoT)
8) Design Practical Multi-Year Roadmap for
Cyber-Physical Security Integration
9) Professional Association Membership for
85
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
4) Develop Professional CERT Team
5) Profile YOUR Security Staff and
Contractors for Possible Risks
9) Professional Association Membership for
Team Networking & Skill Building
10) Cyber Legal Protection – Check Your
Contracts for Cyber Trading Risks
Later, in the 2Later, in the 2ndnd Presentation, we’ll reviewPresentation, we’ll review Advanced Cybersecurity DevelopmentsAdvanced Cybersecurity Developments
Cybersecurity Trends (1): “Integrated Security”Cybersecurity Trends (1): “Integrated Security”
International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain
Cybersecurity Trends (1): “Integrated Security”Cybersecurity Trends (1): “Integrated Security”
International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain
86
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
EastEast--West Security ConferenceWest Security Conference –– Spain2015Spain2015
-- 2121ststCC CyberTrendsCyberTrends Presentation Slides (PDF)Presentation Slides (PDF) --
87
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download Link:Download Link: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
Theme (1)Theme (1) –– “Integrated Security”“Integrated Security” Theme (2)Theme (2) –– “Advanced Cybersecurity“Advanced Cybersecurity”
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
88
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
89
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
90
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1stst Class Honours Degree in Mathematics (BristolClass Honours Degree in Mathematics (Bristol
University) & PhD from Cambridge University in SelfUniversity) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) , and hisOrganising Systems (Evolution of Stochastic Automata) , and his
full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2016 Editions2016 Editions.
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
91
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Download:Download: www.valentina.net/DigiTec2012/
Cybersecurity Trends (1) : “Integrated Security”Cybersecurity Trends (1) : “Integrated Security”
International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain
92
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“Internet of Things”“Internet of Things” Practical ArchitecturePractical Architecture
93
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Internet of Things:Internet of Things: Business Reality!Business Reality!
94
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
“BIG DATA”“BIG DATA” Challenges forChallenges for “IoT”“IoT”
95
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
96
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
Mobile and Wireless Standards forMobile and Wireless Standards for “IoT”“IoT”
97
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
Internet of Things:Internet of Things: Integrated ServicesIntegrated Services
98
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference
ITU: Cybersecurity TrainingITU: Cybersecurity Training –– UTECH, Kingston, JAMAICAUTECH, Kingston, JAMAICA
Government, Central Bank, Energy & Telecoms SectorsGovernment, Central Bank, Energy & Telecoms Sectors
99
“Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and
Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things”
- Madrid, Spain: 26th–27th Oct 2915 -
© Dr David E. Probert : www.VAZA.com ©
32nd International East/West Security Conference

More Related Content

What's hot

CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Dr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
Dr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Dr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Dr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
Dr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
Dr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
Dr David Probert
 

What's hot (20)

CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 

Viewers also liked

Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Content Management That Won't Rot Your Brain
Content Management That Won't Rot Your BrainContent Management That Won't Rot Your Brain
Content Management That Won't Rot Your BrainSean Cribbs
 
iBMS - SmartCity fundamentals (Example)
iBMS - SmartCity fundamentals (Example)iBMS - SmartCity fundamentals (Example)
iBMS - SmartCity fundamentals (Example)
nick_gtg
 
Gift city command and control center concept and_implementation_challanges_so...
Gift city command and control center concept and_implementation_challanges_so...Gift city command and control center concept and_implementation_challanges_so...
Gift city command and control center concept and_implementation_challanges_so...
Nilesh Kumar Purey
 
The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008
Tim Bass
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
Jay McBain
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio
 
Presentation for uploading on website_smart city Vadodara
Presentation for uploading on website_smart city VadodaraPresentation for uploading on website_smart city Vadodara
Presentation for uploading on website_smart city VadodaraSagar Ghadge
 
12th Coaltrans Southern Africa
12th Coaltrans Southern Africa12th Coaltrans Southern Africa
12th Coaltrans Southern Africa
Coaltrans Conferences
 
Big Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureBig Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureOdinot Stanislas
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical System
Maurizio Caporali
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
Nathan Wallace, PhD, PE
 
Internet of Things: The Gold is in the Sensor Data
Internet of Things: The Gold is in the Sensor DataInternet of Things: The Gold is in the Sensor Data
Internet of Things: The Gold is in the Sensor Data
Dr. Mazlan Abbas
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Dinesh O Bareja
 
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart EraSensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
Softweb Solutions
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
Bill Harpley
 
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 

Viewers also liked (20)

Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Content Management That Won't Rot Your Brain
Content Management That Won't Rot Your BrainContent Management That Won't Rot Your Brain
Content Management That Won't Rot Your Brain
 
iBMS - SmartCity fundamentals (Example)
iBMS - SmartCity fundamentals (Example)iBMS - SmartCity fundamentals (Example)
iBMS - SmartCity fundamentals (Example)
 
Gift city command and control center concept and_implementation_challanges_so...
Gift city command and control center concept and_implementation_challanges_so...Gift city command and control center concept and_implementation_challanges_so...
Gift city command and control center concept and_implementation_challanges_so...
 
The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Presentation for uploading on website_smart city Vadodara
Presentation for uploading on website_smart city VadodaraPresentation for uploading on website_smart city Vadodara
Presentation for uploading on website_smart city Vadodara
 
12th Coaltrans Southern Africa
12th Coaltrans Southern Africa12th Coaltrans Southern Africa
12th Coaltrans Southern Africa
 
Big Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureBig Data and Implications on Platform Architecture
Big Data and Implications on Platform Architecture
 
Deft
DeftDeft
Deft
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical System
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Internet of Things: The Gold is in the Sensor Data
Internet of Things: The Gold is in the Sensor DataInternet of Things: The Gold is in the Sensor Data
Internet of Things: The Gold is in the Sensor Data
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart EraSensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
 

Similar to Integrated Cybersecurity and the Internet of Things

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
Dr David Probert
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
ITnation Luxembourg
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
M2M Alliance e.V.
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
G. Jane Louise Cook
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
VadimDavydov3
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
Sabahat Waheed
 

Similar to Integrated Cybersecurity and the Internet of Things (15)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 

More from Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
Dr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
Dr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
Dr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
Dr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
Dr David Probert
 

More from Dr David Probert (7)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Integrated Cybersecurity and the Internet of Things

  • 1. * 21* 21ststC Cybersecurity Trends (1) *C Cybersecurity Trends (1) * “Integrated Security”“Integrated Security” 1 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference “Integrated Security”“Integrated Security” -- Securing the Internet of ThingsSecuring the Internet of Things –– Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail and AliceAbigail and Alice -- To Their Secure Future!To Their Secure Future!
  • 2. **21stC кибербезопасности Тенденции (1)*21stC кибербезопасности Тенденции (1)* интегрированная безопасностьинтегрированная безопасность -- ЗащитаЗащита Интернет вещейИнтернет вещей -- 2 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference -- ЗащитаЗащита Интернет вещейИнтернет вещей -- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail and AliceAbigail and Alice -- To Their Secure Future!To Their Secure Future!
  • 3. Cybersecurity TrendsCybersecurity Trends –– “Dual Themes”“Dual Themes” Theme (1)Theme (1) –– “Integrated Cyber“Integrated Cyber--Physical Security:Physical Security: Securing the Internet of Things”Securing the Internet of Things” -- TOTAL Security now requires Integration of CyberTOTAL Security now requires Integration of Cyber--Physical OperationsPhysical Operations -- Recommendation for Board Level CSO to manage TOTAL Security OpsRecommendation for Board Level CSO to manage TOTAL Security Ops -- Emergence of the “INTERNET of THINGS” as Future CyberEmergence of the “INTERNET of THINGS” as Future Cyber--Conflict ZoneConflict Zone “Integration”:“Integration”: “TOTAL Extended Enterprise Security”“TOTAL Extended Enterprise Security” 09:0009:00 -- 2727thth Oct 2015Oct 2015 3 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference ThemeTheme (2)(2) –– “Advanced Cybersecurity:“Advanced Cybersecurity: Artificial Intelligence & Machine Learning”Artificial Intelligence & Machine Learning” -- Transition from 20Transition from 20ththC Security to Hybrid AIC Security to Hybrid AI--Based 21Based 21ststC Cyber ModelsC Cyber Models -- Using AI & Machine Learning to protect your Enterprise OperationsUsing AI & Machine Learning to protect your Enterprise Operations -- Developing YOUR Action Plans for Advanced Cybersecurity Solutions!Developing YOUR Action Plans for Advanced Cybersecurity Solutions! “Intelligence”:“Intelligence”: ”Real”Real--Time SelfTime Self--Adaptive Cybersecurity”Adaptive Cybersecurity” 11:1511:15 –– 2727thth Oct 2015Oct 2015 Download SlideDownload Slides:s: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 5. 5 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Global IPv4 Internet Servers:Global IPv4 Internet Servers: 24/724/7
  • 6. 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 11 –– Background:Background: “21sr Security Landscape”“21sr Security Landscape” 2 – Cybersecurity: Players & Threats 3 – Cyber-Physical Threat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 6 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 –YOUR TOP 10 Actions & RoadMap
  • 7. Background:Background: 2121ststC Security LandscapeC Security Landscape • Convergence of Physical & Cybersecurity Ops • “Cyber” migrates from IT Dept to Main Board • Global Real-Time Targeted Cyber Attacks – 24/7 • Transition from 20thC Tools (Firewalls & Anti- 7 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference • Transition from 20thC Tools (Firewalls & Anti- virus) to 21stC Tools (AI & Machine Learning) • Emergence of Corporate “Internet of Things” • Evolution of Smart Devices, Cities & Economy • Dramatic increase in Cybercrime & CyberTerror
  • 8. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 20 Year20 Year Evolution ofEvolution of CyberCrimeCyberCrime && CyberTerrorCyberTerror:: 19951995--20152015 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 8 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security Risks:High Security Risks: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning! Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
  • 9. Friday 23Friday 23rdrd Oct 2015Oct 2015 9 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Major CyberMajor Cyber--Attack UK Internet Service ProviderAttack UK Internet Service Provider
  • 10. Typical GlobalTypical Global“Botnet”“Botnet” Cyber AttackCyber Attack 10 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 11. 11 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link:www.gov.ukwww.gov.uk/government/publications/cyber/government/publications/cyber--riskrisk--managementmanagement--aa--boardboard--levellevel--responsibilityresponsibility
  • 12. Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers -- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” -- 12 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 13. UN/ITUUN/ITU –– Global Cybersecurity Index (Dec 2014)Global Cybersecurity Index (Dec 2014) 13 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 14. Typical C2Typical C2 MalwareMalware SignaturesSignatures 14 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference SignaturesSignatures Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 15. ““Visualisation of Cyberspace”:Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 15 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference …From 20…From 20ththC Physical World To 21C Physical World To 21ststC Cyberspace! ...C Cyberspace! ...
  • 16. Map ofMap of RecentRecent Malicious Activity inMalicious Activity in “Cyberspace”“Cyberspace” 16 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference www.team-cymru.org : - Malicious Activity over 30 daysMalicious Activity over 30 days -- Sept 2014Sept 2014
  • 17. Contrast between our Physical & Cyber WorldsContrast between our Physical & Cyber Worlds Convergence to 21Convergence to 21ststC “Intelligent Worlds” will take time!C “Intelligent Worlds” will take time! Physical World = “Space”Physical World = “Space” • Top-Down • Dynamic • Secrecy • Territorial – “Geographical Space” • Government Power • Control • Direct Cyber World = “Time”Cyber World = “Time” • Bottom-Up • Self-Organising • Transparency • Global – “Real-Time” • Citizen Power • Freedom • Proxy 17 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference • Direct • Padlocks & Keys • Convergent • Hierarchical • Carbon Life • Tanks & Missiles • Mass Media • Proxy • Passwords & Pins • Divergent • Organic • Silicon Life • Cyber Weapons & “Botnets” • Social Media “Smart Security” will require Embedded Networked Intelligence in ALL future IoT devices“Smart Security” will require Embedded Networked Intelligence in ALL future IoT devices
  • 18. Smart 3D Network Modelling:Smart 3D Network Modelling: HyperglanceHyperglance 18 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Hyperglance RealHyperglance Real--Time IT Modelling & Visualisation SoftwareTime IT Modelling & Visualisation Software -- Intergence.ComIntergence.Com -- Cambridge, UKCambridge, UK
  • 19. 1 – Background: “21stC Security Landscape” 22 –– CybersecurityCybersecurity :Players and Targets:Players and Targets 3 – Cyber-Physical Threat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 19 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 20. Cybersecurity:Cybersecurity: Players and TargetsPlayers and Targets •• “Bad Guys Threats”:“Bad Guys Threats”: Cyber-Criminals, Cyber- Terrorists, Political Activists, Cyber-Espionage. •• “Good Guy Targets”:“Good Guy Targets”: Critical Information Sectors – Financial Services, Government, Military, 20 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference – Financial Services, Government, Military, Energy, Transportation, Telecommunications, Social Media, Healthcare, Education...... ......TargetsTargets are often high-traffic websites with massive databases of financial & political interest – such as Banks, Social Media & Government
  • 21. CyberCrimeCyberCrime, CyberTerrorism & Espionage, CyberTerrorism & Espionage •• Profit:Profit: Cybercrime is generally for commercial gain and profit with focus on Financial Service Sector. It is now carried out on an “Industrial Scale” by IT Technically skilled criminal specialists as Global eCrime Business! •• Power:Power: CyberTerror by Groups such as ISIS is executed to assert their “power”, develop their “brand” as well 21 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference to assert their “power”, develop their “brand” as well as to attract new “followers” through social media. •• Espionage:Espionage: CyberEspionage Groups are now emerging to penetrate both commercial, government and military organisations around the globe.
  • 22. Main Cyber Players and their MotivesMain Cyber Players and their Motives •• CyberCriminalsCyberCriminals:: Seeking commercial gain from hacking banks & financial institutions as well a phishing scams & computer ransomware •• CyberTerroristsCyberTerrorists:: Mission to penetrate & attack critical assets, and national infrastructure for aims relating to political power & “branding” •• CyberEspionageCyberEspionage:: Using stealthy IT Malware to 22 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• CyberEspionageCyberEspionage:: Using stealthy IT Malware to penetrate both corporate & military data servers in order to obtain plans & intelligence •• CyberHackivistsCyberHackivists:: Groups such as “Anonymous” with Political Agendas that hack sites & servers to virally communicate the “message” for specific campaigns
  • 23. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 33 –– CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 23 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 24. CyberCyber--Physical Threat ScenariosPhysical Threat Scenarios •• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to allow theft or corruption of Cyber Information / IT DataBases and Confidential Plans •• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls & IT Databases to allow Criminals/Terrorists 24 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Controls & IT Databases to allow Criminals/Terrorists to enter Target Facilities (such as Military Bases, Banking HQ, Telco/Mobile Network Operations) •• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the weakest links which in the 21stC will be BOTH Cyber Network Operations and Physical Security Ops
  • 25. “Cyber to Physical Attacks”“Cyber to Physical Attacks” • The illegal penetration of ICT systems may allow criminals to secure information or “make deals” that facilities their real-world activities: –– “Sleeping Cyber Bots”“Sleeping Cyber Bots” – These can be secretly implanted by skilled hackers to secure on-line systems, and programmed to explore the directories & databases, and & then to transmit certain information – Account & Credit Card Details, Plans, Projects, Deals –– Destructive “Cyber Bots”Destructive “Cyber Bots” – If cyber-bots are implanted by terrorist agents within the operational controls of power plants, airports, ports or telecomms facilities then considerable physical damage may result. A simple “delete *.*” command for the root directories would instantly wipe out all files unless the facility has real-time fail-over! Distributed Denial of Service AttacksDistributed Denial of Service Attacks – 25 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference –– Distributed Denial of Service AttacksDistributed Denial of Service Attacks – These not only block access to system, but in the case of a Banking ATM Network, means that the national ATM network has to be closed. Alternatively in the case of an airline check-in and dispatch system, flights are delayed. –– NationalNational CyberAttacksCyberAttacks – Many international organisations such as NATO & US DOD forecast that future regional conflicts will begin with massive cyberattacks to disable their targets’ physical critical communications and information infrastructure (CNI) Nations need to upgrade their national cybersecurity to minimise the risks of HybridHybrid CyberCyber--Physical AttacksPhysical Attacks from terrorists, criminals, hacktivists and political adversaries
  • 26. “Physical to Cyber Attacks”“Physical to Cyber Attacks” • Most “physical to cyber attacks” involve staff, contractors or visitors performing criminal activities in the “misuse of computer assets”: –– Theft & Modification of ICT Assets:Theft & Modification of ICT Assets: It is now almost a daily occurrence for critical information & databases to be either deliberately stolen or simply lost on PCs or Chips –– Fake Maintenance Staff or ContractorsFake Maintenance Staff or Contractors: A relatively easy way for criminals to access secure facilities, particularly in remote regions or developing countries is to fake their personnel IDs and CVs as being legitimate ICT maintenance staff or contractors 26 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference personnel IDs and CVs as being legitimate ICT maintenance staff or contractors –– Compromised Operations Staff:Compromised Operations Staff: Sometime operational ICT staff may be tempted by criminal bribes, or possibly blackmailed into providing passwords, IDs & Access Codes. –– Facility Guests and Visitors:Facility Guests and Visitors: It is standard procedure for guests & visitors to be accompanied at all times in secure premises. In the absence of such procedures, criminals, masquerading as guests or visitors, may install keylogger devices or extract information, plans and databases to wireless enabled USB chips, tablets or phones!
  • 27. RecentRecent CyberCyber Threats & Security FlawsThreats & Security Flaws •• SHELLSHOCKSHELLSHOCK – Discovered 2424thth Sept 2014Sept 2014 – Security flaw in “Bash Software” that is present in the Apple Mac OS X, Unix and Linux. Allows execution of malicious code that could allow access to private data and remote control of server for orchestrated DDOS “BOT” attacks to targeted victim networks. 27 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• HEARTBLEEDHEARTBLEED – Discovered April 2014April 2014 in OpenSSL Cryptography Library (widely used in Transport Layer Security – TLS) as a buffer over-read security flaw. When exploited this allows the theft of users private encryption “keys”, as well as passwords & session cookies
  • 28. Commercialisation ofCommercialisation of “Cyber Toolkits”“Cyber Toolkits” • Industrialisation and Mainstreaming of Cyber Attacks: –– (1) Researchers & Cyber Software Creators of Malicious Codes(1) Researchers & Cyber Software Creators of Malicious Codes : Often creative talented computer scientists that have turned their skills to tools for illegal penetration & control of secure systems –– (2) “Botnet”(2) “Botnet” -- Farmers & HerdersFarmers & Herders : They are responsible for the illegal international distribution and infection of target “zombie” networked laptops PCs & Servers within homes and offices. The malicious codes (malware such as viruses & trojans) are spread through spam emails, infected websites and 28 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference as viruses & trojans) are spread through spam emails, infected websites and “backdoor” attacks. –– (3) “Commercial Botnet Dealers”(3) “Commercial Botnet Dealers” : They sell access to herds of “zombie” infected machines. The embedded malicious code can be triggered to stimulate “Denial of Service (DDoS)” attacks on target servers & websites. The aim is usually to maximise economic and political damage upon the targeted nation and associated businesses. …..For further information see the ITU “BotNet” Mitigation Toolkit(2008)
  • 29. Hybrid CyberHybrid Cyber--PhysicalPhysical HacktivismHacktivism “Anonymous” Attacks on BART“Anonymous” Attacks on BART -- Aug 2011Aug 2011 Physical ProtestsPhysical Protests by International HacktivistHacktivist Group – “Anonymous”“Anonymous” - coupled with multiple Web-Site Cyber AttacksCyber Attacks following incident on Bay Area Transit NetworkBay Area Transit Network -- BARTBART –– San FranciscoSan Francisco 29 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 30. “Historic” Cyber Attack Case Studies“Historic” Cyber Attack Case Studies •• Estonia : May 2007Estonia : May 2007 – Targeted at Government & Banking Servers – and immobilised national & commercial economic infrastructure for several days. This was one of the earliest “historic” massive DDos attacks (Distributed Denial of Service) from unknown proxy sources. •• Georgia : August 2008Georgia : August 2008 – Targeted at Government Servers including Parliament & Ministry of Foreign Affairs, and the National & Commercial Banking Network from anonymous proxy sources. •• South Korea : July 2009South Korea : July 2009 – Targets included the Defence Ministry, Presidential Offices, National Assembly, and Korea Exchange Banks. This attack was also simultaneously targeted at various high-profile US Sites & Servers such as the NY Stock Exchange, White House & Pentagon. 30 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Servers such as the NY Stock Exchange, White House & Pentagon. •• Iran, Indonesia & India : June 2010Iran, Indonesia & India : June 2010 – Computer worm known as StuxnetStuxnet discovered in Industrial Logic Controllers in several countries including Iran , Indonesia and India. Stuxnet was the 1st known sophisticated “Designer” Cyber Malware targeted on specific industrial SCADA Systems (Supervisory Control And Data Acquisition). Duqu Malware (2011) is related to Stuxnet. •• Middle East : May 2012Middle East : May 2012 – Sophisticated Modular Computer Malware known as FlameFlame or Skywiper is discovered infecting computer networks in Middle Eastern Countries including Iran, Saudi Arabia, Syria, Egypt,& Israel …...…...Small scale penetrations & cyber attacks continue on an almost 24/7 against almostSmall scale penetrations & cyber attacks continue on an almost 24/7 against almost ALL countries including government & critical national & industrial infrastructure (CNI)ALL countries including government & critical national & industrial infrastructure (CNI)
  • 31. Growing NationalGrowing National CybersecurityCybersecurity FocusFocus 31 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 32. Cybersecurity Sector Plans:Cybersecurity Sector Plans: GovernmentGovernment 32 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 33. Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia 33 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
  • 34. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 44 ––Banking & Finance: Hybrid CybersecurityBanking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 34 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference34 44 ––Banking & Finance: Hybrid CybersecurityBanking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 –Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 35. CybersecurityCybersecurity Threats & Risks forThreats & Risks for the Banking & Finance Sectorthe Banking & Finance Sector 35 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 36. Banking & Finance:Banking & Finance: CyberCyber--Physical ThreatsPhysical Threats •• Banks & Financial InstitutionsBanks & Financial Institutions are prime targets for Cybercriminals & Cyberterrorists since they are at the heart of ALL National Economies! •• AccessAccess to Accounts is usually indirect through phishing scams, infected websites with malicious scripts, and personal ID Theft. •• OnOn--Line bank transfersLine bank transfers are also commonly used for international money laundering of funds secured from illegal activities •• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the classic “Advanced Fee Scam” as well as Lottery and Auction Scams An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing 36 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference • An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing •• National & Commercial BanksNational & Commercial Banks have also been targets of DDOS cyber attacks from politically motivated and terrorist organisations •• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will receive penetration scans and attempted hacks on a regular basis. •• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal Banking are at the “sharp end” of financial security and require great efforts towards end-user authentication & transaction network security
  • 37. Cyber “Banking Theft”Cyber “Banking Theft”–– CarbanakCarbanak 37 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Estimated ~$1Billion stolen from ~100+ Banks & Financial Institutions during 2013/2014 Researched by “Researched by “KasperskyKaspersky Labs”Labs”
  • 38. Cybercriminals TargetCybercriminals Target Major UK BankMajor UK Bank 38 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 39. Process Flow ofProcess Flow of CyberCriminalCyberCriminal Attack onAttack on Major UKMajor UK Financial InstitutionFinancial Institution: 2010: 2010 39 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Source: White Paper by M86 Security: Aug 2010 Such Cyber Attacks, with variations, take place regularly inSuch Cyber Attacks, with variations, take place regularly in Banking & Financial ServicesBanking & Financial Services . During. During Summer 2014Summer 2014 more thanmore than 83Million Accounts83Million Accounts were “hacked” @were “hacked” @ JP Morgan ChaseJP Morgan Chase-- -- It is estimated that more thanIt is estimated that more than $450Bllion/Year$450Bllion/Year is lost throughis lost through CyberCrimeCyberCrime --
  • 40. Cybersecurity forCybersecurity for Banking & FinanceBanking & Finance 40 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 41. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 41 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference41 4 –Banking & Finance: Hybrid Cybersecurity 55 –– CSO:CSO: Board Level Security IntegrationBoard Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 –Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 42. CSO:CSO: Board Level Security IntegrationBoard Level Security Integration •• 2020ththC Legacy Model:C Legacy Model: Physical and IT Security managed with minimal common operations •• 2121ststC CSO Model:C CSO Model: Business & Government urgently need to manage TOTAL Cyber- 42 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference urgently need to manage TOTAL Cyber- Physical Operations at C-Suite Board Level •• Investment Plan:Investment Plan: CSOs need professional team & Investment Budget to manage physical & cyber security risks, threats and attacks!
  • 43. TraditionalTraditional “Physical Security”“Physical Security” DefencesDefences in the context of “Cybersecurity”in the context of “Cybersecurity” •• Compliance:Compliance: Investments in establishing and upgrading cybersecurity defences against cybercrime means that all physical security and associated operational staff should also be reviewed for compliance with policies, and audited to international standards •• Integration:Integration: Physical and Cybersecurity operations should be linked “step-by-step” at the command and control level in the main government or enterprise operations centre. •• Physical SecurityPhysical Security for critical service sectors such as governments, airports, banks, 43 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Physical SecurityPhysical Security for critical service sectors such as governments, airports, banks, telecommunications, education, energy, healthcare and national defence should be included within the strategy and policies for Cybersecurity and vice versa •• Upgrades:Upgrades: In order to maximise security, Government and Businesses need to upgrade and integrate resources & plans for both physical & cybersecurity during the next years. •• Roadmap:Roadmap: I’d recommend developing a focused total security action plan and roadmap (Physical & Cyber) for each critical sector within YOUR National Economy & Enterprises
  • 44. Cyber:Cyber: Integrated Command & ControlIntegrated Command & Control 44 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Security Operations Command Centre for Global Security Solutions EnterpriseSecurity Operations Command Centre for Global Security Solutions Enterprise•• Security Operations Command Centre for Global Security Solutions EnterpriseSecurity Operations Command Centre for Global Security Solutions Enterprise
  • 45. CyberCyber Integration withIntegration with Physical SecurityPhysical Security OperationsOperations •• CybersecurityCybersecurity for Government, Business & Critical Service Sectors should be tightly integrated with operational physical security solutions including: 1)1) Advanced CCTVAdvanced CCTV Camera Surveillance of the Secure Government & Critical Facilities 2)2) Exterior ANPRExterior ANPR (Automatic Number Plate Recognition) Systems for Car Parking & Entrances 3) Integration of the Cyber CERT/CSIRTCERT/CSIRT with physical CCTV & Alarm Control Centres 4)4) Personnel RFIDPersonnel RFID and/or biometrics office & campus access controls 5) Professionally trained security personnel & guardssecurity personnel & guards – 24/7 – for top security facilities 45 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 5) Professionally trained security personnel & guardssecurity personnel & guards – 24/7 – for top security facilities 6) Implemented facility security policysecurity policy for staff, visitors and contractors 7)7) Intelligent perimeterIntelligent perimeter security controls for campuses and critical service facilities such as airports, power stations, refineries, military bases, hospitals and government institutions 8)8) OnOn--Line Audit trailsLine Audit trails and Electronic Log-Files for secure Physical Facilities 9) Focus upon in-depth physical securityphysical security for computer server rooms, data storage & archives All critical information infrastructures on multiAll critical information infrastructures on multi--building campus sites such as airports,building campus sites such as airports, universities, hospitals, military bases, leisure resorts & government agencies requireuniversities, hospitals, military bases, leisure resorts & government agencies require “Integrated 4D Cyber“Integrated 4D Cyber--Physical Security Operations”Physical Security Operations” = “SMART SECURITY”= “SMART SECURITY”
  • 46. Critical Energy Industry Sector :Critical Energy Industry Sector : “Cybersecurity for“Cybersecurity for Automated Industrial Control & Safety Systems”Automated Industrial Control & Safety Systems” 46 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Protection against “Stuxnet” type designer malware that attacks SCADA systemsProtection against “Stuxnet” type designer malware that attacks SCADA systems
  • 47. Integration of Physical and Cyber SecurityIntegration of Physical and Cyber Security Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 47 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Shopping List!Shopping List! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence in ALL DevicesEmbedded Intelligence in ALL Devices -- Internet of ThingsInternet of Things
  • 48. Integrated Cyber & Physical Security:Integrated Cyber & Physical Security: “The Shopping List”“The Shopping List” ...Smart Security for Business & Government is a Multi...Smart Security for Business & Government is a Multi--Year Programme!Year Programme! 1)1) Cybersecurity TeamCybersecurity Team:: Establishment of a CERT/CSIRT & Professionally Qualified Cybersecurity Team within your Business or Government Organisation 2)2) CNI:CNI: Long Term Critical Infrastructure Protection (CNI) – Protect Critical Info Assets! 3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware, Software, Databases, Secure Network Links, Biometrics & RFID 4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems 5)5) PhysicalPhysical :: Physical Security Applications – CCTV, Alarms, Control Centre 6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness 48 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness 7)7) TrainingTraining:: Cybersecurity Skills, Certification & Professional Training Programme 8)8) EncryptionEncryption:: Implement Data Encryption for Business Critical Info 9)9) Rules & Policies:Rules & Policies: Develop and Communicate Cyber & Physical Security Policies for ALL Staff & Contractors to cover topics such as Wi-Fi and “Bring your Own Device (BYOD)” ..….It is also recommended to develop an economic..….It is also recommended to develop an economic “Cost“Cost--Benefit”Benefit” analysis and detailedanalysis and detailed Business Case in order to justifyBusiness Case in order to justify Cybersecurity InvestmentCybersecurity Investment for your Board of Directors!for your Board of Directors!
  • 49. “Cyber“Cyber –– Physical Security Operations”Physical Security Operations” Convergence to Smart Resilient Security SolutionsConvergence to Smart Resilient Security Solutions •• IP Networks:IP Networks: Physical security and associated Operational Solutions are increasingly based upon sophisticated electronic networked solutions, including biometrics, smart CCTV, intelligent perimeter fences, embedded active & passive RFID Devices and networked real-time sensors •• Convergence:Convergence: CSO-led Management operations for “Physical Security” and “Cybersecurity” will steadily converge & become integrated during the next few years from staff, assets, resources & operational budget perspectives = “Smart Resilient Security”“Smart Resilient Security” •• Smart Security in 3 Phases:Smart Security in 3 Phases: Cyber-Physical Security Integration will evolve over 5 -10 years 49 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference •• Smart Security in 3 Phases:Smart Security in 3 Phases: Cyber-Physical Security Integration will evolve over 5 -10 years 11stst PhasePhase –– Virtual OperationalVirtual Operational IntegrationIntegration -- CSOCSO managed Security Teammanaged Security Team 22ndnd PhasePhase –– Integrated ArchitecturesIntegrated Architectures and Standardsand Standards –– ONEONE CyberCyber--Physical ModelPhysical Model 33rdrd PhasePhase –– Embedded IntelligentEmbedded Intelligent Integration ofIntegration of ALLALL DevicesDevices -- Internet of ThingsInternet of Things •• Business Benefits:Business Benefits: The benefits of integrating cyber and physical security for both Business and Governments are reduced running costs, reduced penetration risk, and increased early warning of co- ordinated cyber-physical security attacks, whether from criminals, hackers or terrorists. …...thethe “Cyber“Cyber--Vardzia”Vardzia” White Paper for Georgia discusses Cybersecurity andWhite Paper for Georgia discusses Cybersecurity and Physical security in some depth, as well as their convergence and integration!Physical security in some depth, as well as their convergence and integration!
  • 50. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 66 –– The Enterprise Internet of Things (IoT)The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 50 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 66 –– The Enterprise Internet of Things (IoT)The Enterprise Internet of Things (IoT) 7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 51. EnterpriseEnterprise “Internet of Things”“Internet of Things”-- IoTIoT •• CyberCyber--Enterprise:Enterprise: During the next 5-10 years of Cyber Evolution the Internet will extend to practically ALL our IT enabled devices within cars, homes, offices, power stations & retail products! This is defined as the “Internet of Things” – IoT. 51 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference This is defined as the “Internet of Things” – IoT. •• Extended Security:Extended Security: ALL IoT connected devices, nodes & servers must be secured against attack! •• CSO Challenge:CSO Challenge: The IoT is the next Cyber Conflict Zone and Security Challenge for Enterprise CSOs!
  • 52. “Internet of Things”:“Internet of Things”: Our DefinitionsOur Definitions 52 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 53. Internet of Things:Internet of Things: Phases of EvolutionPhases of Evolution 53 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 54. “IoT Devices”:“IoT Devices”: Wristbands and WatchesWristbands and Watches 54 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 55. “Google Car”:“Google Car”: Computer Vision ViewComputer Vision View 55 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 56. “IoT”“IoT” Connectivity in the Home:Connectivity in the Home: IBMIBM 56 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 57. Smart City:Smart City: Scaled “IoT” ArchitecturesScaled “IoT” Architectures 57 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 58. Internet of Things:Internet of Things: Spans ALL SectorsSpans ALL Sectors 58 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 59. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 59 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 60. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 60 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 77 –– CyberCyber--Physical Threats from the “IoT”Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 9 – YOUR TOP 10 Actions & RoadMap
  • 61. CyberCyber--PhysicalPhysical Threats from the “IoT”Threats from the “IoT” •• ALL Networked DevicesALL Networked Devices are at risk from Cyber-Hacking, Penetration and Remote Control •• IoT Devices:IoT Devices: Smart Phones, Home Controls, Vehicles, Industrial Controls, Smart Cities, 61 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Vehicles, Industrial Controls, Smart Cities, Power Stations, Utilities, Medical Devices..... •• Legacy Assets:Legacy Assets: Many legacy assets including cars, medical implants, industrial controls are still inherently INSECURE against cyberattacks!
  • 62. CybersecurityCybersecurity for Critical Sector Environmental Networks:for Critical Sector Environmental Networks: “Internet of Things”“Internet of Things” Sensor Networks 62 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 63. 63 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 64. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT” 64 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 65. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 65 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 –Cyber-Physical Threats from the “IoT” 88 –– Practical Solutions for “IoT” SecurityPractical Solutions for “IoT” Security 9 – YOUR TOP 10 Actions & RoadMap
  • 66. PracticalPractical Security SolutionsSecurity Solutions for the “IoT”for the “IoT” •• European UnionEuropean Union -- IERC:IERC: Extensive “IoT” research during the last 5 years including security. •• IEEE IoT Community, Journal & Conference :IEEE IoT Community, Journal & Conference : Recent international focus upon IoT Security 66 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Recent international focus upon IoT Security Standards and Engineering Practical Solutions. •• Advanced Cyber Tools:Advanced Cyber Tools: Sustainable IoT Network Security requires innovative 21stC Adaptive & Self-learning tools based upon research into Artificial Intelligence and Machine Learning.
  • 67. Internet of Things:Internet of Things: Business AlliancesBusiness Alliances 67 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 68. IEEEIEEE World Forum:World Forum: “Internet of Things”“Internet of Things” 1414thth--1515thth December 2015December 2015 –– Milan, ItalyMilan, Italy 68 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 69. IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture 69 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 70. Reports: Securing theReports: Securing the “Internet of Things”“Internet of Things” 70 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 71. Consultant Reports:Consultant Reports: Internet of ThingsInternet of Things 71 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Booz, Allen and HamiltonBooz, Allen and HamiltonErnst and Young Global LimitedErnst and Young Global Limited
  • 72. Ernst and YoungErnst and Young Cybersecurity Reports(1)Cybersecurity Reports(1) 72 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Web: www.ey.com - Ernst & Young Global Limited
  • 73. Ernst and YoungErnst and Young Cybersecurity Reports(2)Cybersecurity Reports(2) 73 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Web: www.ey.com - Ernst & Young Global Limited
  • 74. Useful Publications onUseful Publications on ““Internet of Things”Internet of Things” 74 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 75. European Research Cluster:European Research Cluster: Internet of ThingsInternet of Things 75 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 76. IERCIERC –– Research Cluster Reports onResearch Cluster Reports on ““SmartSmart Systems” & the Internet of ThingsSystems” & the Internet of Things 76 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 77. -- Security the Internet of ThingsSecurity the Internet of Things -- Security & Privacy inSecurity & Privacy in HyperconnectedHyperconnected SocietySociety 77 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 78. Evolution ofEvolution of ”Cyber”Cyber--Physical”Physical” SolutionsSolutions 78 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 79. CyberCyber--Physical Systems as Basis ofPhysical Systems as Basis of “IoT”“IoT” 79 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 80. CyberCyber--PhysicalPhysical System Modules for “IoT”System Modules for “IoT” 80 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 81. “IoT”:“IoT”: Communications StandardsCommunications Standards 81 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 82. Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework 82 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 83. Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture 83 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 84. 1 – Background: “21stC Security Landscape” 2 – Cybersecurity: Players & Targets 3 – Cyber-Physical Threat Scenarios 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 2121ststC Cybersecurity (1)C Cybersecurity (1) –– “Integrated Security”“Integrated Security” 84 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4 –Banking & Finance: Hybrid Cybersecurity 5 – CSO: Board Level Security Integration 6 – The Enterprise Internet of Things (IoT) 7 – Cyber-Physical Threats from the “IoT” 8 – Practical Solutions for IoT Security 99 –– YOURYOUR TOP 10 Actions & RoadMapTOP 10 Actions & RoadMap
  • 85. YOUR TOP 10YOUR TOP 10 Integrated Security ActionsIntegrated Security Actions 1) CSO – Chief Security Officer’s Team –1) CSO – Chief Security Officer’s Team – Board Level Roles & Responsibilities 2) Professional Training – Suggest Top- Level CISSP Certification for Team 3) Implement International Security Standards (ISO/IEC- 27000) 4) Develop Professional CERT Team 6) ICT: Hire Qualified Cyber Systems6) ICT: Hire Qualified Cyber Systems Technology, Software & Operations Team 7) Review Security Risks & Connectivity of ALL Enterprise IP Legacy Assets & Devices (IoT) 8) Design Practical Multi-Year Roadmap for Cyber-Physical Security Integration 9) Professional Association Membership for 85 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference 4) Develop Professional CERT Team 5) Profile YOUR Security Staff and Contractors for Possible Risks 9) Professional Association Membership for Team Networking & Skill Building 10) Cyber Legal Protection – Check Your Contracts for Cyber Trading Risks Later, in the 2Later, in the 2ndnd Presentation, we’ll reviewPresentation, we’ll review Advanced Cybersecurity DevelopmentsAdvanced Cybersecurity Developments
  • 86. Cybersecurity Trends (1): “Integrated Security”Cybersecurity Trends (1): “Integrated Security” International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain Cybersecurity Trends (1): “Integrated Security”Cybersecurity Trends (1): “Integrated Security” International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain 86 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/
  • 87. EastEast--West Security ConferenceWest Security Conference –– Spain2015Spain2015 -- 2121ststCC CyberTrendsCyberTrends Presentation Slides (PDF)Presentation Slides (PDF) -- 87 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download Link:Download Link: www.valentina.net/Madrid2015/www.valentina.net/Madrid2015/ Theme (1)Theme (1) –– “Integrated Security”“Integrated Security” Theme (2)Theme (2) –– “Advanced Cybersecurity“Advanced Cybersecurity”
  • 88. Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Madrid2015/www.Valentina.net/Madrid2015/ 88 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 89. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 89 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 90. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 90 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1Dr David E. Probert is a Fellow of the Royal Statistical Society. He has a 1stst Class Honours Degree in Mathematics (BristolClass Honours Degree in Mathematics (Bristol University) & PhD from Cambridge University in SelfUniversity) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) , and hisOrganising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2016 Editions2016 Editions.
  • 91. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 91 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Download:Download: www.valentina.net/DigiTec2012/
  • 92. Cybersecurity Trends (1) : “Integrated Security”Cybersecurity Trends (1) : “Integrated Security” International EastInternational East--West Security Conference: Madrid, SpainWest Security Conference: Madrid, Spain 92 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 93. “Internet of Things”“Internet of Things” Practical ArchitecturePractical Architecture 93 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 94. Internet of Things:Internet of Things: Business Reality!Business Reality! 94 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 95. “BIG DATA”“BIG DATA” Challenges forChallenges for “IoT”“IoT” 95 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 96. 96 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
  • 97. Mobile and Wireless Standards forMobile and Wireless Standards for “IoT”“IoT” 97 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 98. Internet of Things:Internet of Things: Integrated ServicesIntegrated Services 98 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference
  • 99. ITU: Cybersecurity TrainingITU: Cybersecurity Training –– UTECH, Kingston, JAMAICAUTECH, Kingston, JAMAICA Government, Central Bank, Energy & Telecoms SectorsGovernment, Central Bank, Energy & Telecoms Sectors 99 “Integrated Cyber“Integrated Cyber--Physical Security andPhysical Security and Securing the Enterprise Internet of Things”Securing the Enterprise Internet of Things” - Madrid, Spain: 26th–27th Oct 2915 - © Dr David E. Probert : www.VAZA.com © 32nd International East/West Security Conference