Stiennon Keynote at Trusted Computing Conference 2013, Orlando

1,195 views

Published on

Trust has been broken. Technology will route around trust.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,195
On SlideShare
0
From Embeds
0
Number of Embeds
38
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Stiennon Keynote at Trusted Computing Conference 2013, Orlando

  1. 1. Trust: The Lynchpin of Society Thursday, September 12, 13
  2. 2. June 6, 2013. It begins 2 Thursday, September 12, 13
  3. 3. Why SIGINT Matters 3 Thursday, September 12, 13
  4. 4. Scenarios • Member of Congress contacts with stock brokers • Volume of calls between acquirer and target • CEO-CFO interactions • Journalist-whistleblower interactions • Petraeus-Broadwell 4 Guardian image Thursday, September 12, 13
  5. 5. If Only It Were Just Meta Data 5 ...the Justice Department has secretly interpreted federal surveillance law to permit thousands of low- ranking analysts to eavesdrop on phone calls. Thursday, September 12, 13
  6. 6. “Collect everything” 6 Thursday, September 12, 13
  7. 7. PRISM’s Rogue Gallery 7 Thursday, September 12, 13
  8. 8. Fall out 8 Thursday, September 12, 13
  9. 9. Trust eroding 9 Thursday, September 12, 13
  10. 10. Industry Responding 10 Thursday, September 12, 13
  11. 11. Too Late 11 Thursday, September 12, 13
  12. 12. Summing Up The Reactions 12 Thursday, September 12, 13
  13. 13. The Old Threat Hierarchy • Information Warfare • CyberCrime • Hactivism • Vandalism • Experimentation 13 Thursday, September 12, 13
  14. 14. The New Threat Hierarchy •Surveillance State • Information Warfare • CyberCrime • Hactivism • Vandalism • Experimentation 14 Thursday, September 12, 13
  15. 15. GENIE is Out Of the Bottle Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed "covert implants," sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. -Washington Post 15 Thursday, September 12, 13
  16. 16. Implications for the IT Industry • The state as threat actor • Researching NSA malware • Defending against NSA surveillance 16 Thursday, September 12, 13
  17. 17. The Enterprise Is Compromised • If every employee’s email and phone conversations are captured what are breach notification requirements? • HIPPA? • GLB? • SOX? 17 Thursday, September 12, 13
  18. 18. Good Times For Trusted Computing? • A universal threat must be met with universal security • Spending on encryption set to double within a year • Protecting keys will lead to massive investment in security 18 Thursday, September 12, 13
  19. 19. Look For a Ten Fold Increase in Spending 19 0 175 350 525 700 2003 2013 2023 cyber crime cyber espionage surveillance state $639 Billion Thursday, September 12, 13
  20. 20. A Call To Arms This new threat to Confidentiality, Integrity, Availability, Privacy, Commerce, Democracy, and Stability, greater than all others, is what Trusted Computing was built to counter. Let’s fix this, before it is too late. 20 Thursday, September 12, 13

×