SlideShare a Scribd company logo
••
IIntelligentntelligent IIntegratedntegrated SecuritySecurity
-- CyberCrime, CyberTerror,CyberCrime, CyberTerror, CyberWarCyberWar --
1
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- CyberCrime, CyberTerror,CyberCrime, CyberTerror, CyberWarCyberWar --
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
To the Memory of Dr AlexanderTo the Memory of Dr Alexander AndreevichAndreevich RimskyRimsky--Korsakov 1936Korsakov 1936 –– 20182018
ИИнтеллектуальнаянтеллектуальная иинтегрированнаянтегрированная
****** безопасностьбезопасность ******
2
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
****** безопасностьбезопасность ******
киберкиберпреступностьпреступность,, киберкибертерроризмтерроризм,, киберкибервойнавойна
To the Memory of Dr AlexanderTo the Memory of Dr Alexander AndreevichAndreevich RimskyRimsky--Korsakov 1936Korsakov 1936 –– 20182018
www.Valentina.net/MALTA2019/www.Valentina.net/MALTA2019/
OurOur CyberCyber TrilogyTrilogy:: Finance, Industry & Futures!Finance, Industry & Futures!
Theme (1)Theme (1) -- 2121ststCC Cyber Trends in FinanceCyber Trends in Finance: AI & Machine Learning in Banking!...: AI & Machine Learning in Banking!...
-- Review of Finance SectorReview of Finance Sector –– Technology & Market InnovationTechnology & Market Innovation
-- Mitigation of Cyber Attacks with AI, Machine & Deep LearningMitigation of Cyber Attacks with AI, Machine & Deep Learning
-- Using RealUsing Real--Time Analytics & Big Data to Secure Finance TransactionsTime Analytics & Big Data to Secure Finance Transactions
“Cyber Strategies for Finance & Banks!”“Cyber Strategies for Finance & Banks!” 1111thth Nov:Nov: 9:459:45 –– 10:3010:30
ThemeTheme (2)(2) –– Upgrading Industrial CyberSecurity:Upgrading Industrial CyberSecurity: Securing Critical Infrastructure!...Securing Critical Infrastructure!...
-- 2121ststCC Cyber Landscape for Critical Industrial & Energy SecurityCyber Landscape for Critical Industrial & Energy Security
-- Upgrading Legacy Devices & Control Systems to 21Upgrading Legacy Devices & Control Systems to 21ststC StandardsC Standards
3
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload:: www.valentina.net/www.valentina.net/MALTA2019MALTA2019//
-- Upgrading Legacy Devices & Control Systems to 21Upgrading Legacy Devices & Control Systems to 21ststC StandardsC Standards
-- Securing Critical Assets with Intelligent SelfSecuring Critical Assets with Intelligent Self--Learning Cyber SolutionsLearning Cyber Solutions
“CyberSecurity for Critical Sectors! ““CyberSecurity for Critical Sectors! “ 1111thth Nov: 15:15Nov: 15:15 –– 16:0016:00
Theme (3)Theme (3) –– IIntelligent,ntelligent, IIntegratedntegrated SSecurityecurity:: CCyberCrime,yberCrime, CCyberTerror &yberTerror & CCyberWaryberWar!...!...
-- Understanding and Mapping Worldwide Cyber ThreatsUnderstanding and Mapping Worldwide Cyber Threats
-- Exploring Intelligent Cyber Tools & RealExploring Intelligent Cyber Tools & Real--Time AnalyticsTime Analytics
-- Discussion of CyberSecurity Scenarios forDiscussion of CyberSecurity Scenarios for Next 10 YearsNext 10 Years & Beyond !...& Beyond !...
““CyberVisionsCyberVisions for Intelligent Futures!”for Intelligent Futures!” 1111thth NovNov: 12:30: 12:30 –– 13:1513:15
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
6
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
7
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
8
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
-- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
2012 Representation of2012 Representation of
Possible Gearing for thePossible Gearing for the
AntikytheraAntikythera MechanismMechanism
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
9
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
-- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
5050thth AnniversaryAnniversary of the Internetof the Internet
“ARPANET”:“ARPANET”: 2929thth Oct 1969Oct 1969 –– 20192019
10
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
5050thth AnniversaryAnniversary of the Internetof the Internet
“ARPANET”:“ARPANET”: 2929thth Oct 1969Oct 1969 –– 20192019
11
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
ARPANET: 1974ARPANET: 1974
Densely Populated Regions of IPDensely Populated Regions of IP CyberspaceCyberspace
12
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global IP Internet Registries:Global IP Internet Registries:
RIPE NCCRIPE NCC == RéseauxRéseaux IPIP EuropéensEuropéens National Control CentreNational Control Centre
13
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 121 Nations:62%Only 121 Nations:62%
14
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Only 121 Nations:62%Only 121 Nations:62%
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
15
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace
16
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012
17
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1)
18
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2)
19
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3)
20
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other IP RegistriesOther IP Registries
21
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference 2
1
UN/ITUUN/ITU National CyberSecurity StrategyNational CyberSecurity Strategy
Toolkit (Toolkit (NCSNCS)) –– Global Cyber PartnershipGlobal Cyber Partnership
22
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
12 International Partners12 International Partners :: CyberSecurity Toolkit to help Nations to Design &CyberSecurity Toolkit to help Nations to Design &
Implement Effective CyberSecurity Programmes based uponImplement Effective CyberSecurity Programmes based upon “Best Practice”...“Best Practice”...
Download Link:Download Link: www.itu.int/pub/Dwww.itu.int/pub/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018 -- Sept 2018Sept 2018
23
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
UN/ITUUN/ITU Sept 2018Sept 2018
Download:Download: www.itu.int/dms_pub/ituwww.itu.int/dms_pub/itu--d/opb/str/Dd/opb/str/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018--PDFPDF--E.pdfE.pdf
UN/ITU Final ReportUN/ITU Final Report: Securing Info &: Securing Info &
Comms NetworksComms Networks –– Best Cyber Practice!Best Cyber Practice!
24
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Download:Download: www.itu.int/pub/Dwww.itu.int/pub/D--STGSTG--SG02.03.1SG02.03.1--20172017
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “Cyber Attacks @ Speed of Light!”“Cyber Attacks @ Speed of Light!”
“YOUR“YOUR CyberCyber Defence”Defence”
3 –– RealReal--TimeTime Net AnalytiNet Analyticscs & Modelling& Modelling
“Network Intelligence”“Network Intelligence”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
25
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Network Intelligence”“Network Intelligence”
44 –– Scenario 2020Scenario 2020: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
55--Scenario 2021Scenario 2021: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
66 –– Scenario 2022:Scenario 2022: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
77 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
88––ScenarioScenario 2040: Self2040: Self--Organising Life!Organising Life!
“Neural Security”“Neural Security”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “Cyber Attacks @ Speed of Light!”“Cyber Attacks @ Speed of Light!”
“YOUR“YOUR CyberCyber Defence”Defence”
3 –– RealReal--TimeTime Net AnalytiNet Analyticscs & Modelling& Modelling
“Network Intelligence”“Network Intelligence”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
26
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Network Intelligence”“Network Intelligence”
44 –– Scenario 2020Scenario 2020: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
55--Scenario 2021Scenario 2021: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
66 –– Scenario 2022:Scenario 2022: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
77 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
88––ScenarioScenario 2040: Self2040: Self--Organising Life!Organising Life!
“Neural Security”“Neural Security”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
27
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
28
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
29
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
30
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
31
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
32
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
.....Cost to UK National Health Service =.....Cost to UK National Health Service = £92M£92M
British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings
--“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 --
-- MagecartMagecart Java Script SkimmerJava Script Skimmer --
JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!!
33
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!!
JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!!
FullFull RiskIQRiskIQ Report:Report: www.riskiq.com/blog/labs/magecartwww.riskiq.com/blog/labs/magecart--britishbritish--airwaysairways--breach/breach/
Earlier “Data Breach”:Earlier “Data Breach”: 2211stst April to 28April to 28thth July 2018July 2018 –– 99 Days99 Days!!!.....!!!.....
Cathay Pacific:Cathay Pacific: Data Security BreachData Security Breach
..........9.4m9.4m CustomersCustomers “Hacked”:“Hacked”: 2424thth Oct 2018Oct 2018
34
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Personal Data:Personal Data: Passenger Name; Nationality; Date of Birth; #Phone; email;Passenger Name; Nationality; Date of Birth; #Phone; email;
Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........
Market Value:Market Value: 7%7% Share Price Loss :Share Price Loss : $361m$361m Market Cap Loss:Market Cap Loss: 9 Year Low9 Year Low......
AndroidAndroid Mobile MalwareMobile Malware:: ““GPlayedGPlayed””
-- Trojan AppTrojan App MimicsMimics “Google Play Store”“Google Play Store” --
35
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Discovered: 11th Oct 2018 – TALOS/CISCO
MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet
fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016
36
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such
asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!...
“Internet of Threats”!“Internet of Threats”!
MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017
Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!...
37
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017
Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!...
38
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
*** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
NorskNorsk HydroHydro Cyber AttackCyber Attack –– March 2019March 2019
-- CompanyCompany--WideWide ““LockerGogoLockerGogo”” RansomwareRansomware AttackAttack
-- Large Impact uponLarge Impact upon NorskNorsk HydroHydro Aluminium ProductionAluminium Production
39
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- Estimated Q1 Cost of AttackEstimated Q1 Cost of Attack == $52 Million!$52 Million!
Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack
****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 ***
40
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack
****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 ***
41
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- CyberCriminals asked $100k inCyberCriminals asked $100k in BitcoinBitcoin –– NO Ransom was Paid!....NO Ransom was Paid!....
Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack
****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 ***
42
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- CyberCriminals asked $100k inCyberCriminals asked $100k in BitcoinBitcoin –– NO Ransom was Paid!....NO Ransom was Paid!....Systems are stillSystems are still notnot fully operational after more than 2 weeks!.....fully operational after more than 2 weeks!.....
Secret SurveillanceSecret Surveillance:: May 2019May 2019
-- Alerted by IsraeliAlerted by Israeli NSOGroup.COMNSOGroup.COM --
43
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Enhanced NSO Pegasus Mobile SpywareEnhanced NSO Pegasus Mobile Spyware
Secret SurveillanceSecret Surveillance:: May 2019May 2019
-- Alerted by IsraeliAlerted by Israeli NSOGroup.COMNSOGroup.COM --
Citizen Lab ReportCitizen Lab Report:: Tracking NSO Pegasus Spyware to 45 CountriesTracking NSO Pegasus Spyware to 45 Countries:: Sept 2018Sept 2018
44
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Enhanced NSO Pegasus Mobile SpywareEnhanced NSO Pegasus Mobile Spyware
CyberSecurity:CyberSecurity: Market SectorsMarket Sectors
•• AntiAnti--Virus/FirewallVirus/Firewall
•• ID AuthenticationID Authentication
•• Encryption/PrivacyEncryption/Privacy
•• Risk & ComplianceRisk & Compliance
•• Mobile Device SecurityMobile Device Security
•• AI & Machine LearningAI & Machine Learning
•• Enterprise IoT SecurityEnterprise IoT Security
•• Cloud Security ServicesCloud Security Services
•• Big Data ProtectionBig Data Protection
•• RT Log/Event AnalyticsRT Log/Event Analytics
45
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Mobile Device SecurityMobile Device Security
•• AntiAnti--Fraud MonitoringFraud Monitoring
•• Website ProtectionWebsite Protection
•• S/W Code VerificationS/W Code Verification
•• RT Log/Event AnalyticsRT Log/Event Analytics
•• RealReal--Time Threat MapsTime Threat Maps
•• Smart BiometricsSmart Biometrics
•• Training & CertificationTraining & Certification
Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services...
....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats
“Y“YOUR CyberOUR Cyber Defence”Defence”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
22 –– Cyber Attacks @ Speed of Light!Cyber Attacks @ Speed of Light!
“Y“YOUROUR CyberCyber Defence”Defence”
46
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststC National Cyber Strategy!C National Cyber Strategy!
“Cyber“Cyber @ Government@ Government””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
ThrustSSC – 1st Supersonic Car – October 1997
“Y“YOUROUR CyberCyber Defence”Defence”
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
47
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
BloodHoundBloodHound SSC 2020SSC 2020
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
48
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
1997 Thrust SSC1997 Thrust SSC
Mach ONEMach ONE
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220M Yrs220M Yrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
49
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• 20032003-- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!...
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220M Yrs220M Yrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence”
50
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• 20032003-- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!...
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
51
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
52
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
53
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
54
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
55
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
“Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
56
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!...
...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812
57
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns!
21stC21stC Cyber WarCyber War && Peace!Peace!
JointJoint CyberWarCyberWar Exercise:Exercise: USA & TaiwanUSA & Taiwan
“Cyber Offensive & DefensiveCyber Offensive & Defensive”:”: 66thth Nov 2019Nov 2019
58
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
JointJoint CyberWarCyberWar Exercise:Exercise: USA & TaiwanUSA & Taiwan
“Cyber Offensive & DefensiveCyber Offensive & Defensive”:”: 66thth Nov 2019Nov 2019
****** AITAIT ******
AmericanAmerican
Institute inInstitute in
-- TaiwanTaiwan --
66thth Nov 2019Nov 2019
59
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
33--RealReal--Time Analytics & ModellingTime Analytics & Modelling
“Network Intelligence”“Network Intelligence”
60
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 – Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
““CyberCyber @ Government”@ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Network Intelligence”“Network Intelligence”
“Future Cyber Defence”:“Future Cyber Defence”: NetworkNetwork
Intelligence &Intelligence & RealReal--Time AnalyticsTime Analytics!!
•• Cyber TransitionCyber Transition:: From “Known Bad” (Malware Signatures)
to “Known Good” (Network Assets & User Modelling)...
•• AI Upgrade:AI Upgrade: Future Cyber Defence based upon upgrading &
Integrating Signature & AI/ML based Cyber Security ...
•• Intelligent AnalyticsIntelligent Analytics: Network Traffic, Asset Profiles & User
61
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Intelligent AnalyticsIntelligent Analytics: Network Traffic, Asset Profiles & User
Behaviour modelled & analysed continuosly in Real-Time...
..........Disruptive Cyber TransitionDisruptive Cyber Transition duringduring 2020s2020s from Oldfrom Old
2020ththCC AntiAnti--Virus to NewVirus to New 21stC21stC Intelligent DefenceIntelligent Defence
Transition fromTransition from “Cyber Now“Cyber Now -- 20202020””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20202020 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
62
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
Transition fromTransition from “Cyber Now“Cyber Now -- 20202020””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20192019 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
63
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Global Security:Global Security: 7 Years beyond Snowdon!7 Years beyond Snowdon!
Global Mass SurveillanceGlobal Mass Surveillance::PrePre--20122012
PRISMPRISM: Internet Communications
STELLARWINDSTELLARWIND: Secure Data Mining
XKEYSCORE:XKEYSCORE: Secret Search Engine
Intelligent SurveillanceIntelligent Surveillance::PostPost--20122012
• ExplosionExplosion of AI/ML/Neural Tools
•• IntelligentIntelligent Video Analytics
64
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• IntelligentIntelligent Video Analytics
•• RealReal--TimeTime Global “Asset Tracking”
•• IntegratedIntegrated Physical-Cyber Tools
•• SelfSelf--LearningLearning Data Analytics
• ConvergenceConvergence: HumINT & SigINT
SurveillanceSurveillance Evolves @Evolves @Light Speed!Light Speed!
1717thth Sept 2019Sept 2019
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber Defence”Defence”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
44-- Scenario 2020:Scenario 2020: Cyber & Physical ToolsCyber & Physical Tools
65
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @“Cyber @ GovernmentGovernment””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
Ship: SS Kinsembo – Liverpool to Congo - 1885
44-- Scenario 2020:Scenario 2020: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security“Integrated Security””
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
66
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
67
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
Big HornBig Horn
(2) Rock Creek to Big Horn:(2) Rock Creek to Big Horn: Overland Stage CoachOverland Stage Coach
68
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
1919thth C RoadC Road--MapMap –– Rev Herbert E. ProbertRev Herbert E. Probert –– Cheyenne City to Big Horn, WyomingCheyenne City to Big Horn, Wyoming –– 18841884
Cheyenne CityCheyenne City
Rock CreekRock Creek
(1) Cheyenne City to Rock Creek:(1) Cheyenne City to Rock Creek: Union Pacific RailroadUnion Pacific Railroad
OurOur CyberVisionCyberVision::2020 to 2025+2020 to 2025+
•• ScenarioScenario 20202020 –– Integrated SecurityIntegrated Security:: ManagedManaged
“Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO”
•• ScenarioScenario 20212021 –– Adaptive Security:Adaptive Security: DistributedDistributed
“Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things”
69
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• ScenarioScenario 20222022 –– Learning Security:Learning Security: Transition toTransition to
“Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools
•• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity
based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
Scenario 2020:Scenario 2020: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2020Scenario 2020:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
70
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2020Scenario 2020!
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
71
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
72
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Dashboard!Dashboard!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
CSIM Example: “VIDSYS Inc - Enterprise 2018”
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber DefenceDefence””
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
55 ––Scenario 2021:Scenario 2021: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
73
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Self“Self--Adaptive Security”Adaptive Security”
Scenario 2021Scenario 2021: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Adaptive Security****** Adaptive Security***
• Major Trends and Developments: Scenario 2021Scenario 2021
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
74
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
75
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
76
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
20202020 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
77
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security
Interactive AR DemoInteractive AR Demo
78
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security
79
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security
Interactive AR DemoInteractive AR Demo
80
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security
Interactive AR DemoInteractive AR Demo
81
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security
Interactive AR DemoInteractive AR Demo
82
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
66 ––Scenario 2022:Scenario 2022: Machine LearningMachine Learning
83
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
66 ––Scenario 2022:Scenario 2022: Machine LearningMachine Learning
“Self“Self--Learning Security”Learning Security”
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
84
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
mitigate risks of new malware that have no prior “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
“Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2020!2020!
-- Back to the Future:Back to the Future: The Last 77 Years!The Last 77 Years! --
• 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts)
• 1948 – “Cybernetics” – Norbert Wiener
• 1969 – ARPANet Launched – 4 Packet Switching Net Nodes -
• 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn
• 1982 – Elk Cloner - 1st “Apple Computer Virus
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
85
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
• 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp)
• 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee
• 1993 – Mosaic Browser – NCSA – Illinois, USA
• 2020 –Transition to AI/ML Apps for 21stC CyberSecurity!
-- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
86
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
11stst UK Digital Networks:UK Digital Networks: PCM=PCM=Pulse Code ModulationPulse Code Modulation
-- Analysis of Digital Signal + Gaussian NoiseAnalysis of Digital Signal + Gaussian Noise --
Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
87
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
11stst Doctorate in “Stochastic Machine Learning” @Doctorate in “Stochastic Machine Learning” @
Statistical LaboratoryStatistical Laboratory -- Cambridge University!...Cambridge University!...
DownloadDownload :: www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
88
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
David ProbertDavid Probert
ScenarioScenario 20222022:: “Advanced Cyber Tools”“Advanced Cyber Tools”
*** Self*** Self--Learning Security ***Learning Security ***
• Major Trends and Developments: Scenario 2022Scenario 2022
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
89
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
90
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Algorithmic Computer Trading using Real-Time Neural Nets
& Statistical Maths Tools have been used for 20+ Years!
.....Now they are being applied to provide intelligent
real-time forecasts for enterprise cybersecurity threats!
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
91
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences
• Organic DNA-based Life has adaptation, learning
& intelligence based upon self-organisation:
–– Bee HivesBee Hives with regular Honeycombs
–– Ant ColoniesAnt Colonies & Termite Hills
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
92
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
–– Migrating BirdsMigrating Birds fly in “V” Echelon Formations
–– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids
–– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security
–– Mammalian BrainsMammalian Brains evolved from Neural Networks
....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon
the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems”
93
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! --
The Sociable Weaver Bird
“World’s largest Bird Nests”
*** Southern Africa ***
94
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•Secure Living Community
•Self-Organising Architecture
•Fully scalable for long term growth
•Supports 250+ Weaver Birds
•Real-Time Disaster Alert System
•Sustainable in Semi-Desert Steppe
•Robust against “Enemy Risks”
such as Eagles, Vultures & Snakes
...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
“Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator:
-- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) --
95
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator
....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities”
Dynamic Duffing Equation: - Exhibits Chaotic Behaviour
96
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
2D Super2D Super--Cyclic Cellular Automaton:Cyclic Cellular Automaton:
-- Emergence of Patterns from Random ChaosEmergence of Patterns from Random Chaos --
97
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Cellular Automata:Cellular Automata: “Games of Life”“Games of Life”
98
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set
99
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
100
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
* Mandelbrot Fractal: In* Mandelbrot Fractal: In--Depth Animation *Depth Animation *
““Machine LearningMachine Learning Algorithms”Algorithms”
101
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmsAlgorithms
102
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- Intelligent InIntelligent In--Depth Data AnalyticsDepth Data Analytics --
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmsAlgorithms
103
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
-- Intelligent InIntelligent In--Depth Data AnalyticsDepth Data Analytics --
““Machine LearningMachine Learning Algorithms”Algorithms”
104
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
SelfSelf--Organizing Map:Organizing Map: MachineMachine--LearningLearning AlgorithmAlgorithm
WebWeb:: diego.codesdiego.codes
DateDate: 21: 21stst Jan 2018Jan 2018
Uruguay:Uruguay: 734 Cities734 Cities
105
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security ConferenceOptimal RouteOptimal Route for “Salesman” to Travel to ALLfor “Salesman” to Travel to ALL 734 Cities734 Cities inin UruguayUruguay!!
Italy:Italy: 16862 Cities16862 Cities
SelfSelf--Organizing Map:Organizing Map: MachineMachine--LearningLearning AlgorithmAlgorithm
WebWeb:: diego.codesdiego.codes
DateDate: 21: 21stst Jan 2018Jan 2018
106
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security ConferenceOptimal RouteOptimal Route for “Salesman” to Travel to ALLfor “Salesman” to Travel to ALL 734 Cities734 Cities inin UruguayUruguay!!
AlgorithmAlgorithm:: KohonenKohonen, T, T (1998)(1998)
“How to Build Smart Security Solutions?”“How to Build Smart Security Solutions?”
• Conceptually - Smart Solutions all use combinations of these
basic ICT “genes” shared with Intelligent Living Systems:
1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked)
2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time and Focus
107
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation
4)4) Smart Solutions & Business Architecture:Smart Solutions & Business Architecture: Integration of the Decision
+ Learning “Genes”, within a Secure & Resilient Systems Environment
......Using AI & Machine Learning we can now design “Smart”......Using AI & Machine Learning we can now design “Smart”
SelfSelf--Learning Cybersecurity Tools to secure YOUR Enterprise!Learning Cybersecurity Tools to secure YOUR Enterprise!
Basic Principles ofBasic Principles of ““Smart Security Solutions”Smart Security Solutions”
• The Application of Artificial Intelligence and Machine Learning
allows us to develop “Smart Security Solutions” as follows:
……..Smart Security Solutions typically possess the following features:……..Smart Security Solutions typically possess the following features:
1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks
2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence
3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
108
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network!
5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to
scale in space & time from micro cells to macro solutions
6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data”
from Social Networks, Search & On-Line Commerce
7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations
………Now we’ll consider how such Smart AI………Now we’ll consider how such Smart AI--based Features can bebased Features can be
designed & engineered into future 21designed & engineered into future 21ststC Cybersecurity Toolkits...C Cybersecurity Toolkits...
Building our Smart Security “Toolkit”Building our Smart Security “Toolkit”
(1) Smart Decision Principles(1) Smart Decision Principles -- “D“D--Genes”Genes”
•• Business DecisionsBusiness Decisions require focusing & filtering of Big Data
sources in Space-Time to create local knowledge (Data Mining).
Hence a useful metaphor is the “Knowledge Lens”:
– Smart Decision “Genes” = Space, Time and Information Focus
– Conceptual “Knowledge Lens” can filter and focus information in
“Space” from searching Big Data Sets to a Small focused Short-List
109
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
“Space” from searching Big Data Sets to a Small focused Short-List
– The “Knowledge Lens” can focus information & present in real-time,
possibly as an stream of multi-media news or market intelligence
•• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle
in the design of smart securitysmart security, smart business & smart governance
....21stC Cyber Attacks (such as Denial of Service) occur in real....21stC Cyber Attacks (such as Denial of Service) occur in real--time @Optical Speedstime @Optical Speeds
via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!
Building our Smart Security “Toolkit”Building our Smart Security “Toolkit”
(2) Smart Learning Principles(2) Smart Learning Principles -- “L“L--Genes”Genes”
•• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and
Scalable Architecture. The Decision “Genes” are relatively traditional
whilst these new Learning “Genes” lie at the heart of Smart Security.
–– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems and
communities which include the well known self-organisation of insect roles
in communities such as ants & bees.
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple
110
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
–– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple
mathematical rules, as in Conway’s “Game of Life”
–– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in complex
chaotic behaviour as found in real world insect populations
–– Scalable ArchitectureScalable Architecture is also an essential feature of both plants & animal life,
and Mandelbrot’s theory of Fractal Curves provides vivid examples.
•• Current Trends:Current Trends: Research into Stochastic Machine Learning, AI & Self-
Organization is now expanding in Business Labs & Academic Institutions!
..............Big Data Mining,Big Data Mining, Machine Learning,Machine Learning,
Adaptive SystemsAdaptive Systems && Intelligent Analytics!Intelligent Analytics!
111
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Artificial Intelligence & Deep LearningArtificial Intelligence & Deep Learning
112
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
ISP Intelligent Video Analytics:ISP Intelligent Video Analytics: ipsips--analytics.comanalytics.com
Practical Applications ofPractical Applications of Artificial IntelligenceArtificial Intelligence
&& Big Data AnalyticsBig Data Analytics toto Video SurveillanceVideo Surveillance!...!...
•• Target Tracking:Target Tracking: Real-Time Multi-Camera Tracking
through Facial & Behaviour Profiles
•• AI Video AppsAI Video Apps for Retail Store - Self-Check-Out
•• Intelligent Big DataIntelligent Big Data Search for Terror Networks
•• AI Security DiagnosticsAI Security Diagnostics for Satellite Images
113
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
•• AI Security DiagnosticsAI Security Diagnostics for Satellite Images
•• Smart VideoSmart Video Surveillance for “Crowded Places”
..........Integrated MultiIntegrated Multi--SourceSource 24/7 Surveillance using24/7 Surveillance using
Video, Mobile Financial & BioVideo, Mobile Financial & Bio--ProfilesProfiles!...!...
.....&.....& Chinese Unicorns:Chinese Unicorns: SensetimeSensetime && MegviiMegvii (Face++)(Face++)
Information Fusion & Visualization forInformation Fusion & Visualization for
Intelligent Video Surveillance (IVS)Intelligent Video Surveillance (IVS)
Intelligent Deep LearningIntelligent Deep Learning
forfor Video SurveillanceVideo Surveillance
now Global Solution!..now Global Solution!..
114
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Publication AuthorsPublication Authors
ChingChing--Tang Fan,Tang Fan,
YuanYuan--KaiKai wangwang,,
CaiCai--RenRen HuangHuang
IEEEIEEE –– Systems, Man &Systems, Man &
CyberneticsCybernetics –– Jan 2016Jan 2016
DistributedDistributed Deep LearningDeep Learning
Intelligent Video SystemsIntelligent Video Systems
115
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Authors:Authors: JianguoJianguo Chen,Chen,
KenliKenli Li,Li, QingyingQingying Deng,Deng,
KeqinKeqin Li, Philip YuLi, Philip Yu
IEEEIEEE –– Industrial InformaticsIndustrial Informatics –– April 2019April 2019
DistributedDistributed Deep LearningDeep Learning
Intelligent Video SystemsIntelligent Video Systems
116
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Authors:Authors: JianguoJianguo Chen,Chen,
KenliKenli Li,Li, QingyingQingying Deng,Deng,
KeqinKeqin Li, Philip YuLi, Philip Yu
IEEEIEEE –– Industrial InformaticsIndustrial Informatics –– April 2019April 2019
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
117
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
118
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
119
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
120
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
121
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
GGooooggllee Investment inInvestment in AI ResearchAI Research
122
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Source:Source: GoogleGoogle AIAI Copyright:Copyright: CBCBInsightsInsights
GGooooggllee Investment inInvestment in AI ResearchAI Research
123
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
Source:Source: GoogleGoogle AIAI Copyright:Copyright: CBCBInsightsInsights
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
IIntelligentntelligent IIntegratedntegrated Security!...Security!...
77 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent Security”Intelligent Security”
124
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66––Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Cyber“Cyber--Intelligent Security”Intelligent Security”
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
125
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 38 yearsReview Past 38 years-->> 20202020 <<-- Explore Future 38 yearsExplore Future 38 years-->> 20582058
ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security”
• Transition & Full Deployment of Enterprise-Wide
AI/ML-based IntelligentIntelligent “CyberSecurity” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of
Net Traffic, System/Event Logs, Net Nodes, Servers,
Databases, Devices & Users
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
126
* 21stC Intelligent Integrated Security *
...CyberCrime, CyberTerror & CyberWar!
St Julians, Malta – 10th / 11th Nov 2019
© Dr David E. Probert : www.VAZA.com ©
40th International East-West Security Conference
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
augment Classic Detection using “Known Bad”,“Known Bad”, and
hence provide New Generation “Defence In“Defence In--Depth”Depth”
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both Traditional &
Advanced AI/ML “Cybersecurity Tools”
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!

More Related Content

What's hot

Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
Dr David Probert
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
Dr David Probert
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
Dr David Probert
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
Dr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Dr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
Dr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
Dr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
Dr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
Dr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
Dr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
Dr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
Dr David Probert
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 

What's hot (20)

Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 

Similar to Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
Dr David Probert
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
Dr David Probert
 
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
peterdsouza28
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Dr David Probert
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Karuna763604
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
Ian Kelly
 
Cyber-Attack.pptx
Cyber-Attack.pptxCyber-Attack.pptx
Cyber-Attack.pptx
KaisSuhiemat
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
Sylvain Martinez
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
Von Welch
 

Similar to Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar! (12)

21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Cyber-Attack.pptx
Cyber-Attack.pptxCyber-Attack.pptx
Cyber-Attack.pptx
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 

More from Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
Dr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
Dr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
Dr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
Dr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
Dr David Probert
 

More from Dr David Probert (7)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!

  • 1. •• IIntelligentntelligent IIntegratedntegrated SecuritySecurity -- CyberCrime, CyberTerror,CyberCrime, CyberTerror, CyberWarCyberWar -- 1 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- CyberCrime, CyberTerror,CyberCrime, CyberTerror, CyberWarCyberWar -- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational To the Memory of Dr AlexanderTo the Memory of Dr Alexander AndreevichAndreevich RimskyRimsky--Korsakov 1936Korsakov 1936 –– 20182018
  • 2. ИИнтеллектуальнаянтеллектуальная иинтегрированнаянтегрированная ****** безопасностьбезопасность ****** 2 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference ****** безопасностьбезопасность ****** киберкиберпреступностьпреступность,, киберкибертерроризмтерроризм,, киберкибервойнавойна To the Memory of Dr AlexanderTo the Memory of Dr Alexander AndreevichAndreevich RimskyRimsky--Korsakov 1936Korsakov 1936 –– 20182018 www.Valentina.net/MALTA2019/www.Valentina.net/MALTA2019/
  • 3. OurOur CyberCyber TrilogyTrilogy:: Finance, Industry & Futures!Finance, Industry & Futures! Theme (1)Theme (1) -- 2121ststCC Cyber Trends in FinanceCyber Trends in Finance: AI & Machine Learning in Banking!...: AI & Machine Learning in Banking!... -- Review of Finance SectorReview of Finance Sector –– Technology & Market InnovationTechnology & Market Innovation -- Mitigation of Cyber Attacks with AI, Machine & Deep LearningMitigation of Cyber Attacks with AI, Machine & Deep Learning -- Using RealUsing Real--Time Analytics & Big Data to Secure Finance TransactionsTime Analytics & Big Data to Secure Finance Transactions “Cyber Strategies for Finance & Banks!”“Cyber Strategies for Finance & Banks!” 1111thth Nov:Nov: 9:459:45 –– 10:3010:30 ThemeTheme (2)(2) –– Upgrading Industrial CyberSecurity:Upgrading Industrial CyberSecurity: Securing Critical Infrastructure!...Securing Critical Infrastructure!... -- 2121ststCC Cyber Landscape for Critical Industrial & Energy SecurityCyber Landscape for Critical Industrial & Energy Security -- Upgrading Legacy Devices & Control Systems to 21Upgrading Legacy Devices & Control Systems to 21ststC StandardsC Standards 3 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload:: www.valentina.net/www.valentina.net/MALTA2019MALTA2019// -- Upgrading Legacy Devices & Control Systems to 21Upgrading Legacy Devices & Control Systems to 21ststC StandardsC Standards -- Securing Critical Assets with Intelligent SelfSecuring Critical Assets with Intelligent Self--Learning Cyber SolutionsLearning Cyber Solutions “CyberSecurity for Critical Sectors! ““CyberSecurity for Critical Sectors! “ 1111thth Nov: 15:15Nov: 15:15 –– 16:0016:00 Theme (3)Theme (3) –– IIntelligent,ntelligent, IIntegratedntegrated SSecurityecurity:: CCyberCrime,yberCrime, CCyberTerror &yberTerror & CCyberWaryberWar!...!... -- Understanding and Mapping Worldwide Cyber ThreatsUnderstanding and Mapping Worldwide Cyber Threats -- Exploring Intelligent Cyber Tools & RealExploring Intelligent Cyber Tools & Real--Time AnalyticsTime Analytics -- Discussion of CyberSecurity Scenarios forDiscussion of CyberSecurity Scenarios for Next 10 YearsNext 10 Years & Beyond !...& Beyond !... ““CyberVisionsCyberVisions for Intelligent Futures!”for Intelligent Futures!” 1111thth NovNov: 12:30: 12:30 –– 13:1513:15
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 6. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 6 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 7. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- 7 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
  • 8. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 8 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism -- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
  • 9. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 2012 Representation of2012 Representation of Possible Gearing for thePossible Gearing for the AntikytheraAntikythera MechanismMechanism αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 9 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism -- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
  • 10. 5050thth AnniversaryAnniversary of the Internetof the Internet “ARPANET”:“ARPANET”: 2929thth Oct 1969Oct 1969 –– 20192019 10 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 11. 5050thth AnniversaryAnniversary of the Internetof the Internet “ARPANET”:“ARPANET”: 2929thth Oct 1969Oct 1969 –– 20192019 11 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference ARPANET: 1974ARPANET: 1974
  • 12. Densely Populated Regions of IPDensely Populated Regions of IP CyberspaceCyberspace 12 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 13. Global IP Internet Registries:Global IP Internet Registries: RIPE NCCRIPE NCC == RéseauxRéseaux IPIP EuropéensEuropéens National Control CentreNational Control Centre 13 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 14. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 121 Nations:62%Only 121 Nations:62% 14 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Only 121 Nations:62%Only 121 Nations:62% Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 15. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 15 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 16. The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace 16 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 17. Cyberspace Browser:Cyberspace Browser: Internet Census 2012Internet Census 2012 17 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 18. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(1)Browser Zoom(1) 18 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 19. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(2)Browser Zoom(2) 19 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 20. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): Browser Zoom(3)Browser Zoom(3) 20 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 21. “Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other IP RegistriesOther IP Registries 21 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 2 1
  • 22. UN/ITUUN/ITU National CyberSecurity StrategyNational CyberSecurity Strategy Toolkit (Toolkit (NCSNCS)) –– Global Cyber PartnershipGlobal Cyber Partnership 22 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 12 International Partners12 International Partners :: CyberSecurity Toolkit to help Nations to Design &CyberSecurity Toolkit to help Nations to Design & Implement Effective CyberSecurity Programmes based uponImplement Effective CyberSecurity Programmes based upon “Best Practice”...“Best Practice”... Download Link:Download Link: www.itu.int/pub/Dwww.itu.int/pub/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018 -- Sept 2018Sept 2018
  • 23. 23 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference UN/ITUUN/ITU Sept 2018Sept 2018 Download:Download: www.itu.int/dms_pub/ituwww.itu.int/dms_pub/itu--d/opb/str/Dd/opb/str/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018--PDFPDF--E.pdfE.pdf
  • 24. UN/ITU Final ReportUN/ITU Final Report: Securing Info &: Securing Info & Comms NetworksComms Networks –– Best Cyber Practice!Best Cyber Practice! 24 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Download:Download: www.itu.int/pub/Dwww.itu.int/pub/D--STGSTG--SG02.03.1SG02.03.1--20172017
  • 25. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “Cyber Attacks @ Speed of Light!”“Cyber Attacks @ Speed of Light!” “YOUR“YOUR CyberCyber Defence”Defence” 3 –– RealReal--TimeTime Net AnalytiNet Analyticscs & Modelling& Modelling “Network Intelligence”“Network Intelligence” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 25 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Network Intelligence”“Network Intelligence” 44 –– Scenario 2020Scenario 2020: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” 55--Scenario 2021Scenario 2021: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 66 –– Scenario 2022:Scenario 2022: Machine LearningMachine Learning “Self“Self--Learning”Learning” 77 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 88––ScenarioScenario 2040: Self2040: Self--Organising Life!Organising Life! “Neural Security”“Neural Security” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit”
  • 26. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “Cyber Attacks @ Speed of Light!”“Cyber Attacks @ Speed of Light!” “YOUR“YOUR CyberCyber Defence”Defence” 3 –– RealReal--TimeTime Net AnalytiNet Analyticscs & Modelling& Modelling “Network Intelligence”“Network Intelligence” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar 26 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Network Intelligence”“Network Intelligence” 44 –– Scenario 2020Scenario 2020: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” 55--Scenario 2021Scenario 2021: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 66 –– Scenario 2022:Scenario 2022: Machine LearningMachine Learning “Self“Self--Learning”Learning” 77 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 88––ScenarioScenario 2040: Self2040: Self--Organising Life!Organising Life! “Neural Security”“Neural Security” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society”
  • 27. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 27 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 28. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 28 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 29. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 29 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 30. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 30 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 31. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 31 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 32. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 32 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany .....Cost to UK National Health Service =.....Cost to UK National Health Service = £92M£92M
  • 33. British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings --“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 -- -- MagecartMagecart Java Script SkimmerJava Script Skimmer -- JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!! 33 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!! JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!! FullFull RiskIQRiskIQ Report:Report: www.riskiq.com/blog/labs/magecartwww.riskiq.com/blog/labs/magecart--britishbritish--airwaysairways--breach/breach/ Earlier “Data Breach”:Earlier “Data Breach”: 2211stst April to 28April to 28thth July 2018July 2018 –– 99 Days99 Days!!!.....!!!.....
  • 34. Cathay Pacific:Cathay Pacific: Data Security BreachData Security Breach ..........9.4m9.4m CustomersCustomers “Hacked”:“Hacked”: 2424thth Oct 2018Oct 2018 34 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Personal Data:Personal Data: Passenger Name; Nationality; Date of Birth; #Phone; email;Passenger Name; Nationality; Date of Birth; #Phone; email; Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info........... Market Value:Market Value: 7%7% Share Price Loss :Share Price Loss : $361m$361m Market Cap Loss:Market Cap Loss: 9 Year Low9 Year Low......
  • 35. AndroidAndroid Mobile MalwareMobile Malware:: ““GPlayedGPlayed”” -- Trojan AppTrojan App MimicsMimics “Google Play Store”“Google Play Store” -- 35 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Discovered: 11th Oct 2018 – TALOS/CISCO
  • 36. MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016 36 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!... “Internet of Threats”!“Internet of Threats”!
  • 37. MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017 Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!... 37 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 38. MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017 Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!... 38 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference *** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
  • 39. NorskNorsk HydroHydro Cyber AttackCyber Attack –– March 2019March 2019 -- CompanyCompany--WideWide ““LockerGogoLockerGogo”” RansomwareRansomware AttackAttack -- Large Impact uponLarge Impact upon NorskNorsk HydroHydro Aluminium ProductionAluminium Production 39 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- Estimated Q1 Cost of AttackEstimated Q1 Cost of Attack == $52 Million!$52 Million!
  • 40. Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack ****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 *** 40 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 41. Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack ****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 *** 41 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- CyberCriminals asked $100k inCyberCriminals asked $100k in BitcoinBitcoin –– NO Ransom was Paid!....NO Ransom was Paid!....
  • 42. Baltimore CityBaltimore City RansomwareRansomware CyberAttackCyberAttack ****** EternalBlueEternalBlue MalwareMalware –– 77thth May 2019 ***May 2019 *** 42 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- CyberCriminals asked $100k inCyberCriminals asked $100k in BitcoinBitcoin –– NO Ransom was Paid!....NO Ransom was Paid!....Systems are stillSystems are still notnot fully operational after more than 2 weeks!.....fully operational after more than 2 weeks!.....
  • 43. Secret SurveillanceSecret Surveillance:: May 2019May 2019 -- Alerted by IsraeliAlerted by Israeli NSOGroup.COMNSOGroup.COM -- 43 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Enhanced NSO Pegasus Mobile SpywareEnhanced NSO Pegasus Mobile Spyware
  • 44. Secret SurveillanceSecret Surveillance:: May 2019May 2019 -- Alerted by IsraeliAlerted by Israeli NSOGroup.COMNSOGroup.COM -- Citizen Lab ReportCitizen Lab Report:: Tracking NSO Pegasus Spyware to 45 CountriesTracking NSO Pegasus Spyware to 45 Countries:: Sept 2018Sept 2018 44 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Enhanced NSO Pegasus Mobile SpywareEnhanced NSO Pegasus Mobile Spyware
  • 45. CyberSecurity:CyberSecurity: Market SectorsMarket Sectors •• AntiAnti--Virus/FirewallVirus/Firewall •• ID AuthenticationID Authentication •• Encryption/PrivacyEncryption/Privacy •• Risk & ComplianceRisk & Compliance •• Mobile Device SecurityMobile Device Security •• AI & Machine LearningAI & Machine Learning •• Enterprise IoT SecurityEnterprise IoT Security •• Cloud Security ServicesCloud Security Services •• Big Data ProtectionBig Data Protection •• RT Log/Event AnalyticsRT Log/Event Analytics 45 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Mobile Device SecurityMobile Device Security •• AntiAnti--Fraud MonitoringFraud Monitoring •• Website ProtectionWebsite Protection •• S/W Code VerificationS/W Code Verification •• RT Log/Event AnalyticsRT Log/Event Analytics •• RealReal--Time Threat MapsTime Threat Maps •• Smart BiometricsSmart Biometrics •• Training & CertificationTraining & Certification Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services... ....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
  • 46. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats “Y“YOUR CyberOUR Cyber Defence”Defence” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 22 –– Cyber Attacks @ Speed of Light!Cyber Attacks @ Speed of Light! “Y“YOUROUR CyberCyber Defence”Defence” 46 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststC National Cyber Strategy!C National Cyber Strategy! “Cyber“Cyber @ Government@ Government”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” ThrustSSC – 1st Supersonic Car – October 1997 “Y“YOUROUR CyberCyber Defence”Defence”
  • 47. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 47 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 48. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** BloodHoundBloodHound SSC 2020SSC 2020 ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 48 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com 1997 Thrust SSC1997 Thrust SSC Mach ONEMach ONE
  • 49. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220M Yrs220M Yrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... 49 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• 20032003-- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans ...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
  • 50. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220M Yrs220M Yrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence” 50 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• 20032003-- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans ...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
  • 51. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 51 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 52. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 52 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 53. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 53 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 54. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 54 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 55. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 55 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists! Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
  • 56. “Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 56 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference ““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!... ...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
  • 57. Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812 57 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns! 21stC21stC Cyber WarCyber War && Peace!Peace!
  • 58. JointJoint CyberWarCyberWar Exercise:Exercise: USA & TaiwanUSA & Taiwan “Cyber Offensive & DefensiveCyber Offensive & Defensive”:”: 66thth Nov 2019Nov 2019 58 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 59. JointJoint CyberWarCyberWar Exercise:Exercise: USA & TaiwanUSA & Taiwan “Cyber Offensive & DefensiveCyber Offensive & Defensive”:”: 66thth Nov 2019Nov 2019 ****** AITAIT ****** AmericanAmerican Institute inInstitute in -- TaiwanTaiwan -- 66thth Nov 2019Nov 2019 59 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 60. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018: Cyber & Physical Tools “Integrated Security”“Integrated Security” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 33--RealReal--Time Analytics & ModellingTime Analytics & Modelling “Network Intelligence”“Network Intelligence” 60 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 – Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy ““CyberCyber @ Government”@ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Network Intelligence”“Network Intelligence”
  • 61. “Future Cyber Defence”:“Future Cyber Defence”: NetworkNetwork Intelligence &Intelligence & RealReal--Time AnalyticsTime Analytics!! •• Cyber TransitionCyber Transition:: From “Known Bad” (Malware Signatures) to “Known Good” (Network Assets & User Modelling)... •• AI Upgrade:AI Upgrade: Future Cyber Defence based upon upgrading & Integrating Signature & AI/ML based Cyber Security ... •• Intelligent AnalyticsIntelligent Analytics: Network Traffic, Asset Profiles & User 61 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Intelligent AnalyticsIntelligent Analytics: Network Traffic, Asset Profiles & User Behaviour modelled & analysed continuosly in Real-Time... ..........Disruptive Cyber TransitionDisruptive Cyber Transition duringduring 2020s2020s from Oldfrom Old 2020ththCC AntiAnti--Virus to NewVirus to New 21stC21stC Intelligent DefenceIntelligent Defence
  • 62. Transition fromTransition from “Cyber Now“Cyber Now -- 20202020”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20202020 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 62 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 63. Transition fromTransition from “Cyber Now“Cyber Now -- 20202020”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20192019 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 63 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!” SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 64. Global Security:Global Security: 7 Years beyond Snowdon!7 Years beyond Snowdon! Global Mass SurveillanceGlobal Mass Surveillance::PrePre--20122012 PRISMPRISM: Internet Communications STELLARWINDSTELLARWIND: Secure Data Mining XKEYSCORE:XKEYSCORE: Secret Search Engine Intelligent SurveillanceIntelligent Surveillance::PostPost--20122012 • ExplosionExplosion of AI/ML/Neural Tools •• IntelligentIntelligent Video Analytics 64 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• IntelligentIntelligent Video Analytics •• RealReal--TimeTime Global “Asset Tracking” •• IntegratedIntegrated Physical-Cyber Tools •• SelfSelf--LearningLearning Data Analytics • ConvergenceConvergence: HumINT & SigINT SurveillanceSurveillance Evolves @Evolves @Light Speed!Light Speed! 1717thth Sept 2019Sept 2019
  • 65. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber Defence”Defence” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence IIntelligentntelligent IIntegratedntegrated Security!...Security!... 44-- Scenario 2020:Scenario 2020: Cyber & Physical ToolsCyber & Physical Tools 65 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @“Cyber @ GovernmentGovernment”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” Ship: SS Kinsembo – Liverpool to Congo - 1885 44-- Scenario 2020:Scenario 2020: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security“Integrated Security””
  • 66. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 66 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 67. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 67 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 68. Big HornBig Horn (2) Rock Creek to Big Horn:(2) Rock Creek to Big Horn: Overland Stage CoachOverland Stage Coach 68 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 1919thth C RoadC Road--MapMap –– Rev Herbert E. ProbertRev Herbert E. Probert –– Cheyenne City to Big Horn, WyomingCheyenne City to Big Horn, Wyoming –– 18841884 Cheyenne CityCheyenne City Rock CreekRock Creek (1) Cheyenne City to Rock Creek:(1) Cheyenne City to Rock Creek: Union Pacific RailroadUnion Pacific Railroad
  • 69. OurOur CyberVisionCyberVision::2020 to 2025+2020 to 2025+ •• ScenarioScenario 20202020 –– Integrated SecurityIntegrated Security:: ManagedManaged “Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO” •• ScenarioScenario 20212021 –– Adaptive Security:Adaptive Security: DistributedDistributed “Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things” 69 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• ScenarioScenario 20222022 –– Learning Security:Learning Security: Transition toTransition to “Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools •• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
  • 70. Scenario 2020:Scenario 2020: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated Security****** Integrated Security*** • Major Trends & Developments: Scenario 2020Scenario 2020: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 70 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2020Scenario 2020!
  • 71. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 71 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 72. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 72 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Dashboard!Dashboard! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things CSIM Example: “VIDSYS Inc - Enterprise 2018”
  • 73. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber DefenceDefence”” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence IIntelligentntelligent IIntegratedntegrated Security!...Security!... 55 ––Scenario 2021:Scenario 2021: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 73 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Self“Self--Adaptive Security”Adaptive Security”
  • 74. Scenario 2021Scenario 2021: “Internet of Things: “Internet of Things -- IoT”IoT” *** Adaptive Security****** Adaptive Security*** • Major Trends and Developments: Scenario 2021Scenario 2021 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 74 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 75. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 75 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 76. 76 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 77. 20202020 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 77 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 78. Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security Interactive AR DemoInteractive AR Demo 78 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
  • 79. Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security 79 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
  • 80. Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security Interactive AR DemoInteractive AR Demo 80 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
  • 81. Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security Interactive AR DemoInteractive AR Demo 81 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
  • 82. Augmented Reality:Augmented Reality: IoTIoT Device SecurityDevice Security Interactive AR DemoInteractive AR Demo 82 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DownloadDownload HBR AR AppHBR AR App from “from “App StoreApp Store”.....”.....
  • 83. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 66 ––Scenario 2022:Scenario 2022: Machine LearningMachine Learning 83 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” 66 ––Scenario 2022:Scenario 2022: Machine LearningMachine Learning “Self“Self--Learning Security”Learning Security”
  • 84. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can 84 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can mitigate risks of new malware that have no prior “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 85. “Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2020!2020! -- Back to the Future:Back to the Future: The Last 77 Years!The Last 77 Years! -- • 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts) • 1948 – “Cybernetics” – Norbert Wiener • 1969 – ARPANet Launched – 4 Packet Switching Net Nodes - • 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn • 1982 – Elk Cloner - 1st “Apple Computer Virus • 1986 – “Brain” – 1st Microsoft MS-DOS Virus 85 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference • 1986 – “Brain” – 1st Microsoft MS-DOS Virus • 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp) • 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee • 1993 – Mosaic Browser – NCSA – Illinois, USA • 2020 –Transition to AI/ML Apps for 21stC CyberSecurity! -- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
  • 86. 86 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 11stst UK Digital Networks:UK Digital Networks: PCM=PCM=Pulse Code ModulationPulse Code Modulation -- Analysis of Digital Signal + Gaussian NoiseAnalysis of Digital Signal + Gaussian Noise --
  • 87. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 87 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 11stst Doctorate in “Stochastic Machine Learning” @Doctorate in “Stochastic Machine Learning” @ Statistical LaboratoryStatistical Laboratory -- Cambridge University!...Cambridge University!... DownloadDownload :: www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 88. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 88 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference David ProbertDavid Probert
  • 89. ScenarioScenario 20222022:: “Advanced Cyber Tools”“Advanced Cyber Tools” *** Self*** Self--Learning Security ***Learning Security *** • Major Trends and Developments: Scenario 2022Scenario 2022 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 89 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 90. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 90 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Algorithmic Computer Trading using Real-Time Neural Nets & Statistical Maths Tools have been used for 20+ Years! .....Now they are being applied to provide intelligent real-time forecasts for enterprise cybersecurity threats!
  • 91. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 91 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 92. SelfSelf--Organisation inOrganisation in BioBio--SciencesSciences • Organic DNA-based Life has adaptation, learning & intelligence based upon self-organisation: –– Bee HivesBee Hives with regular Honeycombs –– Ant ColoniesAnt Colonies & Termite Hills –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations 92 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference –– Migrating BirdsMigrating Birds fly in “V” Echelon Formations –– Plant LifePlant Life adapts to Light, Gravity, Chemicals & Fluids –– Sociable Weaver BirdsSociable Weaver Birds build huge nests for security –– Mammalian BrainsMammalian Brains evolved from Neural Networks ....”Effective Security for theEffective Security for the IoTIoT will also be based uponwill also be based upon the principles of selfthe principles of self--organisation & selforganisation & self--learning”learning”
  • 93. SelfSelf--Organisation inOrganisation in “Bio“Bio--Systems”Systems” 93 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 94. -- Smart Sustainable Security in the Wild!Smart Sustainable Security in the Wild! -- The Sociable Weaver Bird “World’s largest Bird Nests” *** Southern Africa *** 94 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •Secure Living Community •Self-Organising Architecture •Fully scalable for long term growth •Supports 250+ Weaver Birds •Real-Time Disaster Alert System •Sustainable in Semi-Desert Steppe •Robust against “Enemy Risks” such as Eagles, Vultures & Snakes ...all the features of a 21stC-“Cyber Defence Centre”–including Disaster Recovery & Business Continuity!
  • 95. “Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator: -- BelousovBelousov––Zhabotinsky Reaction (BZ)Zhabotinsky Reaction (BZ) -- 95 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 96. Chaotic Attractor:Chaotic Attractor: Duffing OscillatorDuffing Oscillator ....”Chaos” is common in “Smart Systems” and “Cyber Communities”....”Chaos” is common in “Smart Systems” and “Cyber Communities” Dynamic Duffing Equation: - Exhibits Chaotic Behaviour 96 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 97. 2D Super2D Super--Cyclic Cellular Automaton:Cyclic Cellular Automaton: -- Emergence of Patterns from Random ChaosEmergence of Patterns from Random Chaos -- 97 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 98. Cellular Automata:Cellular Automata: “Games of Life”“Games of Life” 98 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 99. “Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set 99 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 100. 100 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference * Mandelbrot Fractal: In* Mandelbrot Fractal: In--Depth Animation *Depth Animation *
  • 101. ““Machine LearningMachine Learning Algorithms”Algorithms” 101 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 102. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmsAlgorithms 102 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- Intelligent InIntelligent In--Depth Data AnalyticsDepth Data Analytics --
  • 103. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmsAlgorithms 103 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference -- Intelligent InIntelligent In--Depth Data AnalyticsDepth Data Analytics --
  • 104. ““Machine LearningMachine Learning Algorithms”Algorithms” 104 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 105. SelfSelf--Organizing Map:Organizing Map: MachineMachine--LearningLearning AlgorithmAlgorithm WebWeb:: diego.codesdiego.codes DateDate: 21: 21stst Jan 2018Jan 2018 Uruguay:Uruguay: 734 Cities734 Cities 105 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security ConferenceOptimal RouteOptimal Route for “Salesman” to Travel to ALLfor “Salesman” to Travel to ALL 734 Cities734 Cities inin UruguayUruguay!! Italy:Italy: 16862 Cities16862 Cities
  • 106. SelfSelf--Organizing Map:Organizing Map: MachineMachine--LearningLearning AlgorithmAlgorithm WebWeb:: diego.codesdiego.codes DateDate: 21: 21stst Jan 2018Jan 2018 106 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security ConferenceOptimal RouteOptimal Route for “Salesman” to Travel to ALLfor “Salesman” to Travel to ALL 734 Cities734 Cities inin UruguayUruguay!! AlgorithmAlgorithm:: KohonenKohonen, T, T (1998)(1998)
  • 107. “How to Build Smart Security Solutions?”“How to Build Smart Security Solutions?” • Conceptually - Smart Solutions all use combinations of these basic ICT “genes” shared with Intelligent Living Systems: 1)1) Hybrid Organisation:Hybrid Organisation: Hierarchical (Pyramid) & Organic (Networked) 2)2) Smart Decision Principles (DSmart Decision Principles (D--Genes):Genes): Space, Time and Focus 107 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 3)3) Smart Learning Principles (LSmart Learning Principles (L--Genes):Genes): Memory, Scaling & Adaptation 4)4) Smart Solutions & Business Architecture:Smart Solutions & Business Architecture: Integration of the Decision + Learning “Genes”, within a Secure & Resilient Systems Environment ......Using AI & Machine Learning we can now design “Smart”......Using AI & Machine Learning we can now design “Smart” SelfSelf--Learning Cybersecurity Tools to secure YOUR Enterprise!Learning Cybersecurity Tools to secure YOUR Enterprise!
  • 108. Basic Principles ofBasic Principles of ““Smart Security Solutions”Smart Security Solutions” • The Application of Artificial Intelligence and Machine Learning allows us to develop “Smart Security Solutions” as follows: ……..Smart Security Solutions typically possess the following features:……..Smart Security Solutions typically possess the following features: 1)1) SpaceSpace--Time Awareness:Time Awareness: Location (GPS) & Real-Time Clocks 2)2) Learning, Adaptation & SelfLearning, Adaptation & Self--Organisation:Organisation: Real-Time Intelligence 3)3) Massive Memory & Storage:Massive Memory & Storage: Local & Remote Cloud Storage 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 108 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 4)4) Sustainability:Sustainability: Embedded Security – Everywhere in the Network! 5)5) Scalable Networked Architecture:Scalable Networked Architecture: Smart Architectures will need to scale in space & time from micro cells to macro solutions 6)6) Decision Focus:Decision Focus: “Knowledge Lens” for Data Mining & “Big Data” from Social Networks, Search & On-Line Commerce 7)7) Systems Integration:Systems Integration: Cyber and Physical Solutions & Operations ………Now we’ll consider how such Smart AI………Now we’ll consider how such Smart AI--based Features can bebased Features can be designed & engineered into future 21designed & engineered into future 21ststC Cybersecurity Toolkits...C Cybersecurity Toolkits...
  • 109. Building our Smart Security “Toolkit”Building our Smart Security “Toolkit” (1) Smart Decision Principles(1) Smart Decision Principles -- “D“D--Genes”Genes” •• Business DecisionsBusiness Decisions require focusing & filtering of Big Data sources in Space-Time to create local knowledge (Data Mining). Hence a useful metaphor is the “Knowledge Lens”: – Smart Decision “Genes” = Space, Time and Information Focus – Conceptual “Knowledge Lens” can filter and focus information in “Space” from searching Big Data Sets to a Small focused Short-List 109 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference “Space” from searching Big Data Sets to a Small focused Short-List – The “Knowledge Lens” can focus information & present in real-time, possibly as an stream of multi-media news or market intelligence •• “Knowledge Lens”:“Knowledge Lens”: This concept can be a useful architectural principle in the design of smart securitysmart security, smart business & smart governance ....21stC Cyber Attacks (such as Denial of Service) occur in real....21stC Cyber Attacks (such as Denial of Service) occur in real--time @Optical Speedstime @Optical Speeds via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!via worldwide proxy servers, so ultra fast analysis, decisions and action is a must!
  • 110. Building our Smart Security “Toolkit”Building our Smart Security “Toolkit” (2) Smart Learning Principles(2) Smart Learning Principles -- “L“L--Genes”Genes” •• Smart LearningSmart Learning requires: Self-Organisation, Adaptation, Memory and Scalable Architecture. The Decision “Genes” are relatively traditional whilst these new Learning “Genes” lie at the heart of Smart Security. –– SelfSelf--OrganisationOrganisation & Adaptation are essential principles of living systems and communities which include the well known self-organisation of insect roles in communities such as ants & bees. –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple 110 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference –– Cellular AutomataCellular Automata demonstrate relatively complex behaviour from simple mathematical rules, as in Conway’s “Game of Life” –– Simple Dynamic Recursive MapsSimple Dynamic Recursive Maps such as x => 4x(1-x) also result in complex chaotic behaviour as found in real world insect populations –– Scalable ArchitectureScalable Architecture is also an essential feature of both plants & animal life, and Mandelbrot’s theory of Fractal Curves provides vivid examples. •• Current Trends:Current Trends: Research into Stochastic Machine Learning, AI & Self- Organization is now expanding in Business Labs & Academic Institutions!
  • 111. ..............Big Data Mining,Big Data Mining, Machine Learning,Machine Learning, Adaptive SystemsAdaptive Systems && Intelligent Analytics!Intelligent Analytics! 111 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference
  • 112. Artificial Intelligence & Deep LearningArtificial Intelligence & Deep Learning 112 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference ISP Intelligent Video Analytics:ISP Intelligent Video Analytics: ipsips--analytics.comanalytics.com
  • 113. Practical Applications ofPractical Applications of Artificial IntelligenceArtificial Intelligence && Big Data AnalyticsBig Data Analytics toto Video SurveillanceVideo Surveillance!...!... •• Target Tracking:Target Tracking: Real-Time Multi-Camera Tracking through Facial & Behaviour Profiles •• AI Video AppsAI Video Apps for Retail Store - Self-Check-Out •• Intelligent Big DataIntelligent Big Data Search for Terror Networks •• AI Security DiagnosticsAI Security Diagnostics for Satellite Images 113 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference •• AI Security DiagnosticsAI Security Diagnostics for Satellite Images •• Smart VideoSmart Video Surveillance for “Crowded Places” ..........Integrated MultiIntegrated Multi--SourceSource 24/7 Surveillance using24/7 Surveillance using Video, Mobile Financial & BioVideo, Mobile Financial & Bio--ProfilesProfiles!...!... .....&.....& Chinese Unicorns:Chinese Unicorns: SensetimeSensetime && MegviiMegvii (Face++)(Face++)
  • 114. Information Fusion & Visualization forInformation Fusion & Visualization for Intelligent Video Surveillance (IVS)Intelligent Video Surveillance (IVS) Intelligent Deep LearningIntelligent Deep Learning forfor Video SurveillanceVideo Surveillance now Global Solution!..now Global Solution!.. 114 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Publication AuthorsPublication Authors ChingChing--Tang Fan,Tang Fan, YuanYuan--KaiKai wangwang,, CaiCai--RenRen HuangHuang IEEEIEEE –– Systems, Man &Systems, Man & CyberneticsCybernetics –– Jan 2016Jan 2016
  • 115. DistributedDistributed Deep LearningDeep Learning Intelligent Video SystemsIntelligent Video Systems 115 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Authors:Authors: JianguoJianguo Chen,Chen, KenliKenli Li,Li, QingyingQingying Deng,Deng, KeqinKeqin Li, Philip YuLi, Philip Yu IEEEIEEE –– Industrial InformaticsIndustrial Informatics –– April 2019April 2019
  • 116. DistributedDistributed Deep LearningDeep Learning Intelligent Video SystemsIntelligent Video Systems 116 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Authors:Authors: JianguoJianguo Chen,Chen, KenliKenli Li,Li, QingyingQingying Deng,Deng, KeqinKeqin Li, Philip YuLi, Philip Yu IEEEIEEE –– Industrial InformaticsIndustrial Informatics –– April 2019April 2019
  • 117. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 117 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 118. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 118 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 119. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 119 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 120. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 120 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 121. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 121 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 122. GGooooggllee Investment inInvestment in AI ResearchAI Research 122 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Source:Source: GoogleGoogle AIAI Copyright:Copyright: CBCBInsightsInsights
  • 123. GGooooggllee Investment inInvestment in AI ResearchAI Research 123 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference Source:Source: GoogleGoogle AIAI Copyright:Copyright: CBCBInsightsInsights
  • 124. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” IIntelligentntelligent IIntegratedntegrated Security!...Security!... 77 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent Security”Intelligent Security” 124 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66––Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Cyber“Cyber--Intelligent Security”Intelligent Security”
  • 125. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 125 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 38 yearsReview Past 38 years-->> 20202020 <<-- Explore Future 38 yearsExplore Future 38 years-->> 20582058
  • 126. ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security” • Transition & Full Deployment of Enterprise-Wide AI/ML-based IntelligentIntelligent “CyberSecurity” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to 126 * 21stC Intelligent Integrated Security * ...CyberCrime, CyberTerror & CyberWar! St Julians, Malta – 10th / 11th Nov 2019 © Dr David E. Probert : www.VAZA.com © 40th International East-West Security Conference • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to augment Classic Detection using “Known Bad”,“Known Bad”, and hence provide New Generation “Defence In“Defence In--Depth”Depth” • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both Traditional & Advanced AI/ML “Cybersecurity Tools”