[4yfn]cyber security innovation, an urgent call to cyber heroes sm
Post on 14-Apr-2017
159 Views
Preview:
TRANSCRIPT
CYBER SECURITY INNOVATION
AN URGENT CALL FOR CYBER HEROS
ME
Co-founder -> Cyber Security Hub – Barcelona
Founder and VP Engineering -> Innovating: Crime and
fraud detection/prevention platform
Managing Director -> Helping to find the most disruptive
Cyber Security startups
Carlos Valderrama
Over 15 years in Cyber Security, Computer Forensics and Cyber Intelligence
CURRENT SITUATION What’s happening out there?
Cyber Security Incidents reported to the U.S. CERT
CURRENT SITUATION
CURRENT SITUATION
ATMs, POS, Banking Trojans, contactless pickpockets, etc, etc, etc.
CURRENT SITUATION
It’s clear that the security procedures utilized by companies today (big and small) is completely failing and with the huge growth of IoT products (from smart fridges to Barbie dolls) of which many are buggy from the factory, criminals are not only compromising our data but also that of our family
CURRENT SITUATION
IoT devices
CURRENT SITUATION
• Marketing • State-sponsored • Competitiveness • Crime/Terrorism
Privacy and Cyber Espionage
CURRENT SITUATION
CURRENT SITUATION
Air traffic control systems, railways, power stations, water plants, cars, etc, etc.
Terrorism
Cyber terrorism
CURRENT SITUATION
“Premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of Investigation
Crypto War 2.0 - Apple Case
CURRENT SITUATION
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
REAL TIME ATTACKS
The battle
CURRENT SITUATION
Why are the bad guys winning?
CURRENT SITUATION
CURRENT MODEL New challenges, old methods
CURRENT MODEL
• Complexity is the enemy of security • Complexity is expensive • Simplicity is the ultimate sophistication – Leonardo Davinci • Simplicity is the complexity resolved – Constantin Brancusi
CYBER SECURITY DISRUPTION
Digital disruption
CYBER SECURITY DISRUPTION
You know the Cyber Security Disruption is not happening when…
• Telco providers • Power plants • Banks • Computers • Smartphones • Pacemakers • Email providers • Browsers • Operating Systems • Social Networks • Cars • Drones • …
Everyone and everything is getting hacked!
We can’t detect it and prevent it
> >
CYBER SECURITY
Innovation is the answer
CYBER SECURITY
Companies
Corporate network, corporate servers and
computers, Internet Services, Internet of Things, Online Banking, BYOD, Online
Services
Citizens
Internet of Things, Personal computers, Online services, Cars, Smart city technology,
Mobile phones, Apps, Internet Services, Online
Banking, Drones
Government
Government network, Government servers and computers, Government
data, Public records, eGovernment, Online
services, International affairs
Public Infrastructure
Critical infrastructure, smart
cities, Cars, Internet of Things and connected devices, traffic lights,
Security Cameras, Public transport infrastructure
CYBER SECURITY
THE MARKET Cyber Security
WHY CYBER SECURTIY?
“In 2014 venture capitalists invested a record amount in privately held companies in the Cyber Security industry“
“In 2014, companies reported 42.8 million detected attacks worldwide, a 48% YoY increase”
“The Cyber Security Market will be worth $170.21 Billion by 2020”
“$3.3 billion invested in Cyber Security by VCs in 2015 – VCs chasing Rising Cyber Security Spending”
“Cyber Security startup Tanium raising new VC at $2.5 billion valuation”
“Investors are pouring billions into Cyber Security firms”
THE MOVERS & SHAKERS
Some of the leading European startups making a change in the Cyber Security sector
Makers of the Blackphone. Silent Circle provides multiplatform secure communication services for mobile devices and desktop
Develops continuous authentication and verification technology that provides identity and access management solutions
The easy browser extension that hides your IP address, encrypts your traffic and protects your privacy
Scytl develops secure electronic voting and electoral modernization solutions for the public and private sectors
Telegram is a cloud-based instant messaging service. Telegram messages are heavily encrypted and can self-destruct
The world leader in Enterprise Immune System technology for cyber security
Silobreaker is a data analytics company specialising in cyber security and risk intelligence.
Provides cyber situational awareness that helps organizations protect against cyber attacks and loss of intellectual property
THE MAP
For more detail, the table can be found here.
BIG CYBER SECURITY EXITS
INVESTMENT HISTORY
INVESTMENT HISTORY
SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year (REUTERS)
THE NECESSITY Players
THE BIG PICTURE
University/Education
Government
Niche Investors/Accelerators
Startups
Corporations
Cyber Security Community
Women
Men
CYBER HEROES NEEDED
Lean startup Fellow founders
Funding Legal
Sales Marketing/Growth Hacking
Cyber Security Operations
CYBER HEROES NEEDED
JOIN US We want you!
THANK YOU!
carlos@hackcradle.com
top related