expect the unexpected - cloudsec.com · electronic attacks on critical infrastructure ....

21
EXPECT THE UNEXPECTED Jon Clay Director, Global Threat Communications Trend Micro #CLOUDSEC

Upload: others

Post on 21-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

EXPECT THE UNEXPECTED Jon Clay Director, Global Threat Communications Trend Micro

#CLOUDSEC

Page 2: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

2

THE UNEXPECTED

WE’VE GOT NEXT-GEN THREAT DEFENCE!

Source: @MatiasKatz

Page 3: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

3

THREAT ACTORS

Organised Cybercrime

Industrial Espionage

Activists / Terrorists

State Sponsored

Page 4: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

TECHNOLOGY DISRUPTION How digital disruption will impact cybersecurity

#CLOUDSEC

Page 5: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

WHAT’S ONE THING IN COMMON HERE?

5

Page 6: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

EXPECT TECHNOLOGY DISRUPTION

6

“Digital disruption, when properly understood, should terrify you.”

James McQuivey Author of “Digital Disruption:

Unleashing the Next Wave of Innovation”

Page 7: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DISRUPTION #1: CLOUD COMPUTING

7

Cloud computing has disrupted every industry it has touched. Enable more disruptive technologies to come.

Hackers will find and attack weaknesses in the building blocks and joints of cloud computing.

Page 8: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DISRUPTION #2: MOBILE

8

“Every once in a while a revolutionary product comes along that changes everything.”

- Steve Jobs, 2007

Empowering Wearable Technologies, Location Sensing and Internet of Things (IoT) today.

Cybercriminals can strike their targets from anywhere. More entry points for them to infiltrate an unsecured system or network.

Page 9: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DISRUPTION #3: BIG DATA

9

Organisations will use Big Data to satisfy their customers better.

Hackers will also use Big Data to exploit their victims better.

Page 10: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DISRUPTION #4: SOCIAL MEDIA

10

Social media helps reach people easier and quicker.

Cybercriminals want to reach you similarly too.

Page 11: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DISRUPTION #5: INTERNET OF THINGS

11

Anything and everything that connects with the Internet can be hacked.

IoT could be the “Network of all networks” in the future.

25 billion connected things by 2020 – Gartner

Immature and experimental now.

Page 12: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

UP AND COMING …

12

Page 13: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

THE FUTURE OF CYBER THREATS

What will it be like?

#CLOUDSEC

Page 14: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

THE FUTURE OF CYBER THREATS

14

Disruptive technologies will produce large, complex and intelligent hyper-connected networks.

Cybercriminals will follow technology disruption closely to develop and launch attacks in unexpected ways.

Page 15: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

THE FUTURE OF CYBER THREATS

15

Cloud-powered Botnets and DDoS

Attacks

Electronic Attacks on Critical

Infrastructure Micro-Criminality

Bio-hacks for Multi-factor

Authentication

Cyber-enabled Violence

Malware for Humans Cyber Gang Wars

High Impact, Targeted Identity Theft and Avatar

Hijack

Sophisticated Reputation

Manipulation

Misuse of Augmented Reality

Abuse of Unmanned

Vehicles and Smart Machines

Hacks against Internet of Things

with Direct Physical Impact

Source: Project 2020 by ICSPA, Europol and Trend Micro

Page 16: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

HOW CYBERSECURITY CAN PREVAIL Strategies for survival

16

Page 17: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

HOW CYBERSECURITY CAN PREVAIL

Strategies for survival

#CLOUDSEC

Page 18: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

18

BASIC INTERMEDIATE ADVANCED

Endpoint Security Network Segmentation

Firewall & IPS Web Security

Application Security

Two-Factor Authentication Mobile Security

Data Security

Advanced Threat

Detection Security Intelligence Network Forensics

Connected Threat Defence

SECURITY OPERATIONS

Access Management • Change Management • Vulnerability Management • Incident Response

DEFENDING AGAINST THE UNEXPECTED

Page 19: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

DEFENDING AGAINST THE UNEXPECTED

19

Assess Educate Identify gaps KPIs Continuous

Improvement Report

Action Plan for Cybersecurity Leaders

Page 20: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

20

THEN YOU CAN BE LIKE HIM …..

FEARLESS

Page 21: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware

Jon Clay Director, Global Threat Communications Trend Micro