SlideShare a Scribd company logo
CYBER 3.0
POSITIONING PAPER                                               THE PERFECT STORM: CONFLUENCE OF
                                                                HYPER-CONNECTIVITY, MOBILITY AND BIG DATA
CYBER 3.0: WHERE THE SEMANTIC
WEB AND CYBER MEET                                              In order to stress the full weight of the meaning of Cyber
                                                                3.0, it is important to first put the state of our networked
JOHN TROBOUGH, PRESIDENT, NARUS, INC.                           world into perspective. We can start by stating categorically
FEBRUARY 2013                                                   that the Internet is changing: Access, content, and
                                                                application creation and consumption are growing
The term “Cyber 3.0” has been used mostly in reference to       exponentially.
the strategy described by U.S. Deputy Defense Secretary
William Lynn at an RSA conference. In his Cyber 3.0             From narrowband to broadband, from kilobits to gigabits,
strategy, Lynn stresses a five-part plan as a comprehensive     from talking people to talking things, our networked world is
approach to protect critical assets. The plan involves          changing forever. Today, the Internet is hyper-connecting
equipping military networks with active defenses, ensuring      people who are now enjoying super-fast connectivity
civilian networks are adequately protected, and marshaling      anywhere, anytime and via any device. They are always on
the nation’s technological and human resources to maintain      and always on the move, roaming seamlessly from network
its status in cyberspace1.                                      to network. Mobile platforms and applications only extend
                                                                this behavior. As people use a growing collection of devices
Cyber 3.0 technologies will be the key to enable such           to stay connected (i.e., laptops, tablets, smartphones,
protection, and is achieved when the semantic Web’s             televisions), they change the way they work and collaborate,
automated, continuous machine learning is applied to            the way they socialize, the way they communicate, and the
cybersecurity and surveillance.                                 way they conduct business.

Cyber 3.0 will be the foundation for a future in which          Add to this the sheer enormity of digital information and
machines drive decision-making. But Cyber 3.0’s ability to      devices that now connect us: Cisco estimates that by 2015,
deliver greater visibility, control and context has             the amount of data crossing the Internet every five minutes
far-reaching implications in our current, hyper-connected       will be equivalent to the total size of all movies ever made,
environment, where massive amounts of information move          and that annual Internet traffic will reach a zettabyte
easily and quickly across people, locations, time, devices      — roughly 200 times the total size of all words ever spoken
and networks. It is a world where human intervention and        by humans2. On a similar note, the number of connected
intelligence alone simply can’t sift through and analyze        devices will explode in the next few years, reaching an
information fast enough. Indeed, arming cybersecurity           astonishing 50 billion by 20203. By this time, connected
organizations with the incisive intelligence afforded by this   devices could even outnumber connected people by a ratio
machine learning means cybersecurity incidents are              of 6-to-14. This interconnectedness indeed presents a level
identified and security policies are enforced before critical   of productivity and convenience never before seen, but it
assets are compromised.                                         also tempts fate: The variety and number of endpoints — so
                                                                difficult to manage and secure — invite cyber breaches, and
                                                                their hyper-connectivity guarantees the spread of cyber
                                                                incidents as well as a safe hiding place for malicious
                                                                machines and individuals engaged in illegal, dangerous or
                                                                otherwise unsavory activities.
Cyber is nonetheless integral to our everyday lives. Anything   CYBER 3.0: THE ANSWER TO A NEW GENERATION
we do in the cyber world can be effortlessly shifted across     OF CYBER CHALLENGES
people, locations, devices and time. While on one hand,
cyber is positioned to dramatically facilitate the process of   Indeed, given the great velocity, volume and variety of data
knowledge discovery and sharing among people (increasing        generated now, the cyber technologies that rely on manual
performance and productivity and enabling faster                processes and human intervention — which worked well in
interaction), on the other, companies of all sizes must now     the past — no longer suffice to address cybersecurity
secure terabytes and petabytes of data. That data enters        organizations’ current and future pain points, which
and leaves enterprises at unprecedented rates, and is often     correlate directly with the aforementioned confluence of
stored and accessed from a range of locations, such as from     hyper-connectivity, mobility and big data. Rather,
smartphones and tablets, virtual servers, or the cloud.         next-generation cyber technology that can deliver visibility,
                                                                control and context despite this confluence is the only
On top of all this, all the aforementioned endpoints have       answer. This technology is achieved by applying machine
their own security needs, and the cybersecurity challenge       learning to cybersecurity and surveillance, and is called
today lies in how to control, manage and secure large           Cyber 3.0.
volumes of data in increasingly vulnerable and open
environments. Specifically, cybersecurity organizations         In using Cyber 3.0, human intervention is largely removed
need answers to how they can:                                   from the operational lifecycle, and processes, including
                                                                decision-making, are tackled by automation: Data is
•	 Ensure visibility by keeping pace with the                   automatically captured, contextualized and fused at an
   unprecedented and unpredictable progression of new           atomic granularity by smart machines, which then
   applications running in their networks                       automatically connect devices to information (extracted
•	 Retain control by staying ahead of the bad guys (for a       from data) and information to people, and then execute
   change), who breach cybersecurity perimeters to steal        end-to-end operational workflows. Workflows are executed
   invaluable corporate information or harm critical assets     faster than ever, and results are more accurate than ever.
•	 Position themselves to better define and enforce             More and more facts are presented to analysts, who will be
   security policies across every aspect of their network       called on only to make a final decision, rather than to sift
   (elements, content and users) to ensure they are aligned     through massive piles of data in search of hidden or
   with their mission and gain situational awareness            counter-intuitive answers. And analysts are relieved from
                                                                taking part in very lengthy investigation processes to
•	 Understand context and slash the investigation time
                                                                understand the after-the-fact root cause.
   and time-to-resolution of a security problem or cyber
   incident

Unfortunately, cybersecurity organizations are impeded
from realizing any of these. This is because their current
solutions require human intervention to manually correlate
growing, disparate data and identify and manage all cyber
threats. And human beings just don’t scale.
In the future, semantic analysis and sentiment analysis will   Clearly, these three attributes are essential to keeping
be implanted into high-powered machines to:                    critical assets safe from cybersecurity incidents or
                                                               breaches in security policy. However, achieving them in the
•	 Dissect and analyze data across disparate networks          face of constantly changing data that is spread across
•	 Extract information across distinct dimensions within       countless sources, networks and applications is no small
   those networks                                              task — and definitely out of reach for any principles or
                                                               practices that rely even partly on human interference.
•	 Fuse knowledge and provide contextualized and definite
                                                               Moreover, without visibility, control and context, one can
   answers
                                                               never be sure what type of action to take.
•	 Continuously learn the dynamics of the data to ensure
   that analytics and data models are promptly refined in      Cyber 3.0 is not a mythical direction of what “could”
   an automated fashion                                        happen. It’s the reality we will face as the Web grows, as new
•	 Compound previously captured information with new           technologies are put into practice, and as access to more
   information to dynamically enrich models with               and more devices continues to grow. The future is obvious.
   discovered knowledge                                        The question is: How will we respond?

Ultimately, cybersecurity organizations are able to better     By virtue of machine learning capabilities, Cyber 3.0 is the
control their networks via situational awareness gained        only approach that can rise to these challenges and deliver
through a complete understanding of network activity and       the incisive intelligence required to protect our critical
user behavior. This level of understanding is achieved by      assets and communities now and into the future.
integrating data from three different planes: the network
plane, the semantic plane and the user plane. The network      John Trobough is president of Narus, Inc., a subsidiary of The Boeing
plane mines traditional network elements like applications     Company (NYSE: BA). Based in Silicon Valley, Narus is a longtime
and protocols; the semantic plane extracts the content and     cybersecurity innovator and industry pioneer, with patents awarded
                                                               and pending for its work in cyber.
relationships; and the user plane establishes information
about the users. By applying machine learning and analytics
to the dimensions extracted across these three planes,
cybersecurity organizations have the visibility, context and   1	“DoD Talks Up Plans to Deploy Cybercommandos,” Tech News World,
control required to fulfill their missions and business        February 11, 2011 <http://www.technewsworld.com/story/
                                                               DoD-Talks-Up-Plans-to-Deploy-Cybercommandos-71872.html>.
objectives.
                                                               2	 “The Zettabyte Era,” May 30, 2012, Cisco <http://www.cisco.com/en/

•	 Visibility: Full situational awareness across hosts,        US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/
   services, applications, protocols and ports, traffic,       VNI_Hyperconnectivity_WP.html>.
   content, relationships, and users to determine baselines    3	 “The Internet of Things,” Cisco <http://share.cisco.com/

   and detect anomalies                                        internet-of-things.html>.
•	 Control: Alignment of networks, content and users with      4	 “The State of Broadband 2012: Achieving Digital Inclusion for All,”
   enterprise goals, ensuring information security and         International Telecommunications Union, September 2012 <http://
   intellectual property protection                            www.broadbandcommission.org/Documents/bb-annualreport2012.
•	 Context: Identification of relationships and connectivity   pdf#page=1&zoom=auto,0,842>.
   among network elements, content and end users

More Related Content

What's hot

Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Ankita Gupta
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
BhaktiKarale
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
University of Geneva
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
Fraunhofer Institute for Secure Information Technology
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012Sharmin Ahammad
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
Ludmila Morozova-Buss
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
graywilliams
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
Dr. Prashant Vats
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
siswarren
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
iosrjce
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Ludmila Morozova-Buss
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemAustin Eppstein
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
Raquel Salcedo Gomes
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
Jarno Limnéll
 

What's hot (20)

Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 

Similar to Narus Cyber 3.0 Position Paper

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
Discussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informatDiscussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informat
VinaOconner450
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
Kim Jensen
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
Booz Allen Hamilton
 
AWhile there are several ways of gathering information on a
AWhile there are several ways of gathering information on a AWhile there are several ways of gathering information on a
AWhile there are several ways of gathering information on a
kacie8xcheco
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
John D. Johnson
 
The Metaverse Society - Safety first: Designing a responsible metaverse
The Metaverse Society - Safety first: Designing a responsible metaverseThe Metaverse Society - Safety first: Designing a responsible metaverse
The Metaverse Society - Safety first: Designing a responsible metaverse
The Metaverse Society
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
Booz Allen Hamilton
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
Mousselmal Tarik
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
santhoshyadav23
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 

Similar to Narus Cyber 3.0 Position Paper (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Discussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informatDiscussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informat
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
AWhile there are several ways of gathering information on a
AWhile there are several ways of gathering information on a AWhile there are several ways of gathering information on a
AWhile there are several ways of gathering information on a
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
The Metaverse Society - Safety first: Designing a responsible metaverse
The Metaverse Society - Safety first: Designing a responsible metaverseThe Metaverse Society - Safety first: Designing a responsible metaverse
The Metaverse Society - Safety first: Designing a responsible metaverse
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Narus Cyber 3.0 Position Paper

  • 1. CYBER 3.0 POSITIONING PAPER THE PERFECT STORM: CONFLUENCE OF HYPER-CONNECTIVITY, MOBILITY AND BIG DATA CYBER 3.0: WHERE THE SEMANTIC WEB AND CYBER MEET In order to stress the full weight of the meaning of Cyber 3.0, it is important to first put the state of our networked JOHN TROBOUGH, PRESIDENT, NARUS, INC. world into perspective. We can start by stating categorically FEBRUARY 2013 that the Internet is changing: Access, content, and application creation and consumption are growing The term “Cyber 3.0” has been used mostly in reference to exponentially. the strategy described by U.S. Deputy Defense Secretary William Lynn at an RSA conference. In his Cyber 3.0 From narrowband to broadband, from kilobits to gigabits, strategy, Lynn stresses a five-part plan as a comprehensive from talking people to talking things, our networked world is approach to protect critical assets. The plan involves changing forever. Today, the Internet is hyper-connecting equipping military networks with active defenses, ensuring people who are now enjoying super-fast connectivity civilian networks are adequately protected, and marshaling anywhere, anytime and via any device. They are always on the nation’s technological and human resources to maintain and always on the move, roaming seamlessly from network its status in cyberspace1. to network. Mobile platforms and applications only extend this behavior. As people use a growing collection of devices Cyber 3.0 technologies will be the key to enable such to stay connected (i.e., laptops, tablets, smartphones, protection, and is achieved when the semantic Web’s televisions), they change the way they work and collaborate, automated, continuous machine learning is applied to the way they socialize, the way they communicate, and the cybersecurity and surveillance. way they conduct business. Cyber 3.0 will be the foundation for a future in which Add to this the sheer enormity of digital information and machines drive decision-making. But Cyber 3.0’s ability to devices that now connect us: Cisco estimates that by 2015, deliver greater visibility, control and context has the amount of data crossing the Internet every five minutes far-reaching implications in our current, hyper-connected will be equivalent to the total size of all movies ever made, environment, where massive amounts of information move and that annual Internet traffic will reach a zettabyte easily and quickly across people, locations, time, devices — roughly 200 times the total size of all words ever spoken and networks. It is a world where human intervention and by humans2. On a similar note, the number of connected intelligence alone simply can’t sift through and analyze devices will explode in the next few years, reaching an information fast enough. Indeed, arming cybersecurity astonishing 50 billion by 20203. By this time, connected organizations with the incisive intelligence afforded by this devices could even outnumber connected people by a ratio machine learning means cybersecurity incidents are of 6-to-14. This interconnectedness indeed presents a level identified and security policies are enforced before critical of productivity and convenience never before seen, but it assets are compromised. also tempts fate: The variety and number of endpoints — so difficult to manage and secure — invite cyber breaches, and their hyper-connectivity guarantees the spread of cyber incidents as well as a safe hiding place for malicious machines and individuals engaged in illegal, dangerous or otherwise unsavory activities.
  • 2. Cyber is nonetheless integral to our everyday lives. Anything CYBER 3.0: THE ANSWER TO A NEW GENERATION we do in the cyber world can be effortlessly shifted across OF CYBER CHALLENGES people, locations, devices and time. While on one hand, cyber is positioned to dramatically facilitate the process of Indeed, given the great velocity, volume and variety of data knowledge discovery and sharing among people (increasing generated now, the cyber technologies that rely on manual performance and productivity and enabling faster processes and human intervention — which worked well in interaction), on the other, companies of all sizes must now the past — no longer suffice to address cybersecurity secure terabytes and petabytes of data. That data enters organizations’ current and future pain points, which and leaves enterprises at unprecedented rates, and is often correlate directly with the aforementioned confluence of stored and accessed from a range of locations, such as from hyper-connectivity, mobility and big data. Rather, smartphones and tablets, virtual servers, or the cloud. next-generation cyber technology that can deliver visibility, control and context despite this confluence is the only On top of all this, all the aforementioned endpoints have answer. This technology is achieved by applying machine their own security needs, and the cybersecurity challenge learning to cybersecurity and surveillance, and is called today lies in how to control, manage and secure large Cyber 3.0. volumes of data in increasingly vulnerable and open environments. Specifically, cybersecurity organizations In using Cyber 3.0, human intervention is largely removed need answers to how they can: from the operational lifecycle, and processes, including decision-making, are tackled by automation: Data is • Ensure visibility by keeping pace with the automatically captured, contextualized and fused at an unprecedented and unpredictable progression of new atomic granularity by smart machines, which then applications running in their networks automatically connect devices to information (extracted • Retain control by staying ahead of the bad guys (for a from data) and information to people, and then execute change), who breach cybersecurity perimeters to steal end-to-end operational workflows. Workflows are executed invaluable corporate information or harm critical assets faster than ever, and results are more accurate than ever. • Position themselves to better define and enforce More and more facts are presented to analysts, who will be security policies across every aspect of their network called on only to make a final decision, rather than to sift (elements, content and users) to ensure they are aligned through massive piles of data in search of hidden or with their mission and gain situational awareness counter-intuitive answers. And analysts are relieved from taking part in very lengthy investigation processes to • Understand context and slash the investigation time understand the after-the-fact root cause. and time-to-resolution of a security problem or cyber incident Unfortunately, cybersecurity organizations are impeded from realizing any of these. This is because their current solutions require human intervention to manually correlate growing, disparate data and identify and manage all cyber threats. And human beings just don’t scale.
  • 3. In the future, semantic analysis and sentiment analysis will Clearly, these three attributes are essential to keeping be implanted into high-powered machines to: critical assets safe from cybersecurity incidents or breaches in security policy. However, achieving them in the • Dissect and analyze data across disparate networks face of constantly changing data that is spread across • Extract information across distinct dimensions within countless sources, networks and applications is no small those networks task — and definitely out of reach for any principles or practices that rely even partly on human interference. • Fuse knowledge and provide contextualized and definite Moreover, without visibility, control and context, one can answers never be sure what type of action to take. • Continuously learn the dynamics of the data to ensure that analytics and data models are promptly refined in Cyber 3.0 is not a mythical direction of what “could” an automated fashion happen. It’s the reality we will face as the Web grows, as new • Compound previously captured information with new technologies are put into practice, and as access to more information to dynamically enrich models with and more devices continues to grow. The future is obvious. discovered knowledge The question is: How will we respond? Ultimately, cybersecurity organizations are able to better By virtue of machine learning capabilities, Cyber 3.0 is the control their networks via situational awareness gained only approach that can rise to these challenges and deliver through a complete understanding of network activity and the incisive intelligence required to protect our critical user behavior. This level of understanding is achieved by assets and communities now and into the future. integrating data from three different planes: the network plane, the semantic plane and the user plane. The network John Trobough is president of Narus, Inc., a subsidiary of The Boeing plane mines traditional network elements like applications Company (NYSE: BA). Based in Silicon Valley, Narus is a longtime and protocols; the semantic plane extracts the content and cybersecurity innovator and industry pioneer, with patents awarded and pending for its work in cyber. relationships; and the user plane establishes information about the users. By applying machine learning and analytics to the dimensions extracted across these three planes, cybersecurity organizations have the visibility, context and 1 “DoD Talks Up Plans to Deploy Cybercommandos,” Tech News World, control required to fulfill their missions and business February 11, 2011 <http://www.technewsworld.com/story/ DoD-Talks-Up-Plans-to-Deploy-Cybercommandos-71872.html>. objectives. 2 “The Zettabyte Era,” May 30, 2012, Cisco <http://www.cisco.com/en/ • Visibility: Full situational awareness across hosts, US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/ services, applications, protocols and ports, traffic, VNI_Hyperconnectivity_WP.html>. content, relationships, and users to determine baselines 3 “The Internet of Things,” Cisco <http://share.cisco.com/ and detect anomalies internet-of-things.html>. • Control: Alignment of networks, content and users with 4 “The State of Broadband 2012: Achieving Digital Inclusion for All,” enterprise goals, ensuring information security and International Telecommunications Union, September 2012 <http:// intellectual property protection www.broadbandcommission.org/Documents/bb-annualreport2012. • Context: Identification of relationships and connectivity pdf#page=1&zoom=auto,0,842>. among network elements, content and end users