SlideShare a Scribd company logo
1 of 16
Download to read offline
Giorgio Mosca
Strategy and Technology Director
Cyber Defense: three fundamental ‎steps
“It would seem that Caesar's recurrent and
deep-rooted fault was his concentration in
pursuing the objective immediately in front of
his eyes to the neglect of his wider object. “
― B.H. Liddell Hart, Strategy
2
4B
Users 2019
5.9B
Smartphone
Connections 2020
44 ZB
Data zettabytes in
2020
24.4B
IP-connected
devices 2019
200B
IoT Devices 2019
159 B$
Global public
cloud market
2020
168 EB
Exabytes/month
in IP traffic in
2019
0
Downtime &
Latency request
In 5 years
3
The future
Physical and Digital worlds
overlapping at an
unprecedented rate
Biotechnologies, blockchain,
nanotechnologies, robotics, 3d
printing, cyber-physical systems,
massive usage of augmented
reality and artificial intelligence.
Societies will be a networked cyber
physical ecosystem of services,
systems, people, information
Low investments, limited risks, disruptive effects.
Whatever the objective, the cyber option will be
more and more appealing for hostile entities.
4
Some signals
Digital Trust is first
inhibitor factor to UE
Digital Single Market
Connected everything
fuels the emergence of
new attack vectors
NATO declared Cyber the
5th Battlespace domain
Cyber is a main point in
most of Nations and
Board Rooms' Agendas.
Impacted sectors
Transport
Autonomous systems, Situational
awareness
Security
Drone technology, Weapon
systems, Situational awareness
Energy
Smart grid and innovative
EMS/DMS
Healthcare
Smart medical devices, Big data.
robotics
Banking
Blockchain technology
The question
How to manage this complexity for
scenarios like Terrorism,
Cybercrime, Immigration Flows and
Border control, Protection and
Resilience of Transportation,
Communications, Energy,
Manufacturing ?
How to
build / maintain
TRUST?
5
The world
• Italy under strong cyber espionage
• Attacks to Ukraine Crtical Infrastructures
• US claim Russians attacks to presidential elections
• Turkey claims US attacks to Crtical Infrastructures
• Saudi claims Iranian malware attacks
• Estonia, Georgia, Moldavia, Crimea, …
• Scandinavia: Air Traffic Management, Railway
Ticketing, Comms & Telco
6
TECHNOLOGICAL EVOLUTION
• the infrastructure available to armed forces encompasses cyber-physical systems,
autonomous systems, intelligent sensors, satellite and wireless, new applications…
STRATEGIC EVOLUTION
• After the Warsaw Summit for NATO cyberspace will become, practically, an operating
theatre
• Computer Network Operations (CNO): not only defense, but real active military
operations in Joint & Combined scenarios
• Promotion of collective defense & reaction
CYBER WARFARE
• the use of electronic technologies, computer and telecommunication systems to harm
the interests and infrastructures of a country, at large
Will Cyber War take place?
7
Three fundamental steps
(Co)operate
Locally
Source
Carefully
Learn
Globally
8
A global threat management issue
• Cyber crime has an estimated global impact of 400B$ per year
• What's the real technological and operational impact of state-sized threats?
• More and more frequently we hear suspicion of government actors… which
consequences?
• Are only nations the possible origin of “state sized” threats?
• Global threats require shared intelligence. The private sector shares
intelligence embedding conclusions in products… what else is required?
• How to approach threats (terrorism, serious attacks) using cyber space to
create a transnational coordination and distributed attack capabilities?
The "bad guys" have already gone beyond national borders, with a pragmatic
approach, to maximize attack power, "good guys" need to do the same.
9
Learn Globally
International scenario
European Commission initiatives with the
NIS, the role of ENISA and EDA, the
network of national CERT, the Constitution
of the European Cyber Security
Organization (ECSO)
Information exchange,
Cyber situational awareness and Intelligence
unified Platforms (eg. NCIRC) exchange of
information (eg. NCIRC vs CERT-EU)
Strategic evolution
UK 2016-2021 plan (Defend, Develop, Deter),
France and Germany Cyber Commands
China and Russia are very active
If we look at large countries, they are
• building digital defense strategies,
• developing distributed capacity,
• improving technological sectors,
• dedicating relevant portions of their
operational, research and law
enforcement forces to cyber
10
Value Chain & Supply Chain issues
• Strengthen and shorten the technological value chain by encouraging
through all possible instruments the creation and/or the return of actual
technological value in the EU area
• Need for creation of (costly) skills and abilities that are quite rare; promote
science, technology and innovation  less finance and more engineers?
less bureaucracy and more results?
• Value chain & Supply chain resilience : global chains are unavoidable, but
we must have a plan to be resilient and react.
Yesterday it was energy and some utilities, today "essential services" are
many more and by 2018 with NIS we will tell everybody what they are…
11
Source carefully
Build a "Trust Circle" among
Security System Integrators, the Cyber
Community and all the Customers
"Strongly encourage" the (foreign)
technology providers to cooperate
according to shared rules
Both points are driven by the need
to gain visibility of the real behavior
of security tools
Cyber Community
needs to cooperate with a new set of
stakeholders, providers and end-users,
with technological assets becoming
suddenly correlated
Security Process
follows and somehow leads the Customers
in measuring its exposure and building its
security process and capabilities
Cyber Technology Partners
manage (firmly) a liquid ecosystem of
technologies and technology partners
Develop on focused technologies and exchange
Security Services
shift from buying technologies to renting
capabilities. Keep the pace of the evolution.
12
Plan for the worst
Many Nations are organizing efforts from the point of view of attack and
defense.
In various States, there is a tendency to increase the resilience of country
Infosphere considering acts of war on a large scale.
Some examples:
• Various countries are studying a super national DNS able to keep running
the overall infrastructure in the event of a crash, accidental or planned, of
the global DNS network
• UK is developing a strategic plan to increase the resilience of the digital
ecosystem to the invasion of the country Infosphere.
13
(Co)operate locally
Strategy
structure with qualified
domestic partners
a long term program to
strengthen the Infosphere
Standards
revision of rules of
acquisition to ensure
greater timeliness and
confidentiality
Change
acquire concepts such as
deterrence, active defense
operations and strengthen
government institutions like
the CIOC and the CCE
Resources
Recognize qualified resources devoted to capacity building of national defense
14
1. rationalization of infrastructures
2. deterrence capacity development
3. strengthen cyber security centers
4. create advanced cyber intelligence
5. increase the resilience of systems
6. control the vulnerabilities of CNIs
7. cyber-range & cyber academy
8. testing labs for COTS and
technologies
9. constant research and training
10. collaboration among Institutions,
Industry and Academia
A concrete proposal for a national program
15
Developing technologies to detect and
react: Machine Learning, Prediction
models, Human Intelligence integration, …
Integrating cyber in products such as:
RPAS – UAAS, Situational awareness,
Unmanned Vehicle Control, Avionics –
Traffic Control Security, Energy Grids
Being a solid cornerstone of the Cyber
Security trust ecosystem in the EU
Leonardo: targeting European Excellence in Cyber Industry
16
Thank you for your kind attention
Giorgio Mosca
giorgio.mosca@leonardocompany.com
leonardocompany.com

More Related Content

What's hot

02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 

What's hot (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 

Viewers also liked

Viewers also liked (20)

Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
Telespazio Geoinformation platform for Defense and Intelligence: Maritime Dom...
Telespazio Geoinformation platform for Defense and Intelligence: Maritime Dom...Telespazio Geoinformation platform for Defense and Intelligence: Maritime Dom...
Telespazio Geoinformation platform for Defense and Intelligence: Maritime Dom...
 
Leonardo 3Q/9M 2016 Results Presentation
Leonardo 3Q/9M 2016 Results PresentationLeonardo 3Q/9M 2016 Results Presentation
Leonardo 3Q/9M 2016 Results Presentation
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
 
Finmeccanica Full-Year 2015 Presentation
Finmeccanica Full-Year 2015 PresentationFinmeccanica Full-Year 2015 Presentation
Finmeccanica Full-Year 2015 Presentation
 
FIA16: Leonardo Airborne & Space Systems Division: signature of the Prospect ...
FIA16: Leonardo Airborne & Space Systems Division: signature of the Prospect ...FIA16: Leonardo Airborne & Space Systems Division: signature of the Prospect ...
FIA16: Leonardo Airborne & Space Systems Division: signature of the Prospect ...
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
Leonardo Corporate Presentation 11 05 2016
Leonardo  Corporate Presentation 11 05 2016Leonardo  Corporate Presentation 11 05 2016
Leonardo Corporate Presentation 11 05 2016
 
World Speed Record 30th Anniversary 1986-2016
World Speed Record 30th Anniversary 1986-2016World Speed Record 30th Anniversary 1986-2016
World Speed Record 30th Anniversary 1986-2016
 
FIA16: Leonardo Airborne & Space Systems Division: Falco UAS Family
FIA16: Leonardo Airborne & Space Systems Division: Falco UAS FamilyFIA16: Leonardo Airborne & Space Systems Division: Falco UAS Family
FIA16: Leonardo Airborne & Space Systems Division: Falco UAS Family
 
Finmeccanica 3 q 9m 2015 results presentation
Finmeccanica 3 q 9m 2015 results presentationFinmeccanica 3 q 9m 2015 results presentation
Finmeccanica 3 q 9m 2015 results presentation
 
SESAR Project Awards - Best in class Nomination for Pj14.01.04
SESAR Project Awards - Best in class Nomination for Pj14.01.04SESAR Project Awards - Best in class Nomination for Pj14.01.04
SESAR Project Awards - Best in class Nomination for Pj14.01.04
 
MSPO - Leonardo Aircraft Division: M-346, the dual role concept
MSPO - Leonardo Aircraft Division: M-346, the dual role conceptMSPO - Leonardo Aircraft Division: M-346, the dual role concept
MSPO - Leonardo Aircraft Division: M-346, the dual role concept
 
Helitech - Leonardo Helicopters Division: Through-Life approach to the customer
Helitech - Leonardo Helicopters Division: Through-Life approach to the customerHelitech - Leonardo Helicopters Division: Through-Life approach to the customer
Helitech - Leonardo Helicopters Division: Through-Life approach to the customer
 
FIA16: Leonardo Aircraft Division: M-346 programme - the dual role concept
FIA16: Leonardo Aircraft Division: M-346 programme - the dual role conceptFIA16: Leonardo Aircraft Division: M-346 programme - the dual role concept
FIA16: Leonardo Aircraft Division: M-346 programme - the dual role concept
 
Finmeccanica First Half 2015 results presentation
Finmeccanica First Half 2015 results presentationFinmeccanica First Half 2015 results presentation
Finmeccanica First Half 2015 results presentation
 
Leonardo First Half 2016 results presentation
Leonardo First Half 2016 results presentationLeonardo First Half 2016 results presentation
Leonardo First Half 2016 results presentation
 
Green Day 2016 - Earth Observation satellites support climate change monitoring
Green Day 2016 - Earth Observation satellites support climate change monitoringGreen Day 2016 - Earth Observation satellites support climate change monitoring
Green Day 2016 - Earth Observation satellites support climate change monitoring
 
Network Automation in Support of Cyber Defense
Network Automation in Support of Cyber DefenseNetwork Automation in Support of Cyber Defense
Network Automation in Support of Cyber Defense
 
Careers presentation - Big Bang Fair 2017
Careers presentation - Big Bang Fair 2017Careers presentation - Big Bang Fair 2017
Careers presentation - Big Bang Fair 2017
 

Similar to Cyber Defense: three fundamental steps

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
segughana
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 

Similar to Cyber Defense: three fundamental steps (20)

10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Technological innovations in facilities management
Technological innovations in facilities managementTechnological innovations in facilities management
Technological innovations in facilities management
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 

More from Leonardo

More from Leonardo (20)

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdf
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results Presentation
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results Presentation
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 Results
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 Results
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 Results
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 Results
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results Presentation
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 Results
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 Results
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by Simulation
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL Symposium
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft Operations
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS Market
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

Cyber Defense: three fundamental steps

  • 1. Giorgio Mosca Strategy and Technology Director Cyber Defense: three fundamental ‎steps “It would seem that Caesar's recurrent and deep-rooted fault was his concentration in pursuing the objective immediately in front of his eyes to the neglect of his wider object. “ ― B.H. Liddell Hart, Strategy
  • 2. 2 4B Users 2019 5.9B Smartphone Connections 2020 44 ZB Data zettabytes in 2020 24.4B IP-connected devices 2019 200B IoT Devices 2019 159 B$ Global public cloud market 2020 168 EB Exabytes/month in IP traffic in 2019 0 Downtime & Latency request In 5 years
  • 3. 3 The future Physical and Digital worlds overlapping at an unprecedented rate Biotechnologies, blockchain, nanotechnologies, robotics, 3d printing, cyber-physical systems, massive usage of augmented reality and artificial intelligence. Societies will be a networked cyber physical ecosystem of services, systems, people, information Low investments, limited risks, disruptive effects. Whatever the objective, the cyber option will be more and more appealing for hostile entities.
  • 4. 4 Some signals Digital Trust is first inhibitor factor to UE Digital Single Market Connected everything fuels the emergence of new attack vectors NATO declared Cyber the 5th Battlespace domain Cyber is a main point in most of Nations and Board Rooms' Agendas. Impacted sectors Transport Autonomous systems, Situational awareness Security Drone technology, Weapon systems, Situational awareness Energy Smart grid and innovative EMS/DMS Healthcare Smart medical devices, Big data. robotics Banking Blockchain technology The question How to manage this complexity for scenarios like Terrorism, Cybercrime, Immigration Flows and Border control, Protection and Resilience of Transportation, Communications, Energy, Manufacturing ? How to build / maintain TRUST?
  • 5. 5 The world • Italy under strong cyber espionage • Attacks to Ukraine Crtical Infrastructures • US claim Russians attacks to presidential elections • Turkey claims US attacks to Crtical Infrastructures • Saudi claims Iranian malware attacks • Estonia, Georgia, Moldavia, Crimea, … • Scandinavia: Air Traffic Management, Railway Ticketing, Comms & Telco
  • 6. 6 TECHNOLOGICAL EVOLUTION • the infrastructure available to armed forces encompasses cyber-physical systems, autonomous systems, intelligent sensors, satellite and wireless, new applications… STRATEGIC EVOLUTION • After the Warsaw Summit for NATO cyberspace will become, practically, an operating theatre • Computer Network Operations (CNO): not only defense, but real active military operations in Joint & Combined scenarios • Promotion of collective defense & reaction CYBER WARFARE • the use of electronic technologies, computer and telecommunication systems to harm the interests and infrastructures of a country, at large Will Cyber War take place?
  • 8. 8 A global threat management issue • Cyber crime has an estimated global impact of 400B$ per year • What's the real technological and operational impact of state-sized threats? • More and more frequently we hear suspicion of government actors… which consequences? • Are only nations the possible origin of “state sized” threats? • Global threats require shared intelligence. The private sector shares intelligence embedding conclusions in products… what else is required? • How to approach threats (terrorism, serious attacks) using cyber space to create a transnational coordination and distributed attack capabilities? The "bad guys" have already gone beyond national borders, with a pragmatic approach, to maximize attack power, "good guys" need to do the same.
  • 9. 9 Learn Globally International scenario European Commission initiatives with the NIS, the role of ENISA and EDA, the network of national CERT, the Constitution of the European Cyber Security Organization (ECSO) Information exchange, Cyber situational awareness and Intelligence unified Platforms (eg. NCIRC) exchange of information (eg. NCIRC vs CERT-EU) Strategic evolution UK 2016-2021 plan (Defend, Develop, Deter), France and Germany Cyber Commands China and Russia are very active If we look at large countries, they are • building digital defense strategies, • developing distributed capacity, • improving technological sectors, • dedicating relevant portions of their operational, research and law enforcement forces to cyber
  • 10. 10 Value Chain & Supply Chain issues • Strengthen and shorten the technological value chain by encouraging through all possible instruments the creation and/or the return of actual technological value in the EU area • Need for creation of (costly) skills and abilities that are quite rare; promote science, technology and innovation  less finance and more engineers? less bureaucracy and more results? • Value chain & Supply chain resilience : global chains are unavoidable, but we must have a plan to be resilient and react. Yesterday it was energy and some utilities, today "essential services" are many more and by 2018 with NIS we will tell everybody what they are…
  • 11. 11 Source carefully Build a "Trust Circle" among Security System Integrators, the Cyber Community and all the Customers "Strongly encourage" the (foreign) technology providers to cooperate according to shared rules Both points are driven by the need to gain visibility of the real behavior of security tools Cyber Community needs to cooperate with a new set of stakeholders, providers and end-users, with technological assets becoming suddenly correlated Security Process follows and somehow leads the Customers in measuring its exposure and building its security process and capabilities Cyber Technology Partners manage (firmly) a liquid ecosystem of technologies and technology partners Develop on focused technologies and exchange Security Services shift from buying technologies to renting capabilities. Keep the pace of the evolution.
  • 12. 12 Plan for the worst Many Nations are organizing efforts from the point of view of attack and defense. In various States, there is a tendency to increase the resilience of country Infosphere considering acts of war on a large scale. Some examples: • Various countries are studying a super national DNS able to keep running the overall infrastructure in the event of a crash, accidental or planned, of the global DNS network • UK is developing a strategic plan to increase the resilience of the digital ecosystem to the invasion of the country Infosphere.
  • 13. 13 (Co)operate locally Strategy structure with qualified domestic partners a long term program to strengthen the Infosphere Standards revision of rules of acquisition to ensure greater timeliness and confidentiality Change acquire concepts such as deterrence, active defense operations and strengthen government institutions like the CIOC and the CCE Resources Recognize qualified resources devoted to capacity building of national defense
  • 14. 14 1. rationalization of infrastructures 2. deterrence capacity development 3. strengthen cyber security centers 4. create advanced cyber intelligence 5. increase the resilience of systems 6. control the vulnerabilities of CNIs 7. cyber-range & cyber academy 8. testing labs for COTS and technologies 9. constant research and training 10. collaboration among Institutions, Industry and Academia A concrete proposal for a national program
  • 15. 15 Developing technologies to detect and react: Machine Learning, Prediction models, Human Intelligence integration, … Integrating cyber in products such as: RPAS – UAAS, Situational awareness, Unmanned Vehicle Control, Avionics – Traffic Control Security, Energy Grids Being a solid cornerstone of the Cyber Security trust ecosystem in the EU Leonardo: targeting European Excellence in Cyber Industry
  • 16. 16 Thank you for your kind attention Giorgio Mosca giorgio.mosca@leonardocompany.com leonardocompany.com