shaping tomorrow’s cybersecurity landscape increasingly ... · it craftsmanship industrialization...

9
Shaping tomorrow’s cybersecurity landscape The world we live in is increasingly complex .ie .It .fi .ru .pk .vn .tw .th .my .id .au .kr .jp .cn .in .eg .se .pl .nl .it .es .fr .uk .de .ca .us .br .mx .cl .ar 2005 Internet user map Sizing Legend = 5M Internet Users = 10M Internet Users Percent Penetration of Internet Users Number of Internet Users China 111M USA 201M India 26M Brasil 38M Japan 86M Germany 57M UK 42M S. Korea 35M 0 20 40 60 80 100 .do .ve .gt .cr .co .ec .pe .bo .uy .pt .at .ee .Iv .by .sk .hu .cz .ba .si .rs .ro .ua .ge .bg .il .hr .gr .mk .tn .dz .ma .ng .cm .ke .za .sa .ae .az .kz .uz .hk .ph .sg .nz .ir .tr 2015 Internet user map Sizing Legend = 5M Internet Users = 10M Internet Users Percent Penetration of Internet Users Number of Internet Users China 751M USA 287M India 283M Brasil 127M Russia 90M Germany 72M Mexico 68M Nigeria 66M 0 20 40 60 80 100 2025 Internet user map Sizing Legend = 5M Internet Users = 10M Internet Users Percent Penetration of Internet Users Number of Internet Users China 1.1B USA 317M India 708M Brasil 173M Russia 124M Germany 74M Mexico 106M Nigeria 126M 0 20 40 60 80 100 Systems of Intelligence DIGITAL TRANSFORMATION Engage your customers Empower your employees Optimize your operations Transform your products

Upload: others

Post on 23-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

Shaping tomorrow’scybersecurity landscape The world we live in is

increasingly complex

.ie.It.fi

.ru

.pk.vn

.tw.th

.my

.id.au

.kr

.jp.cn

.in

.eg

.se

.pl

.nl

.it.es.fr

.uk.de.ca

.us

.br

.mx

.cl.ar

2005 Internet user map

Sizing Legend= 5M Internet Users

= 10M Internet Users

Percent Penetration of Internet Users Number of Internet Users

China

111M

USA

201M

India

26M

Brasil

38M

Japan

86M

Germany

57M

UK

42M

S. Korea

35M0 20 40 60 80 100

.do

.ve

.gt.cr

.co.ec

.pe.bo

.uy

.pt .at

.ee.Iv

.by.sk.hu.cz

.ba.si .rs

.ro.ua .ge

.bg

.il

.hr.gr.mk

.tn.dz.ma

.ng

.cm

.ke

.za

.sa

.ae

.az .kz.uz

.hk

.ph

.sg

.nz

.ir

.tr

2015 Internet user map

Sizing Legend= 5M Internet Users

= 10M Internet Users

Percent Penetration of Internet Users Number of Internet Users

China

751M

USA

287M

India

283M

Brasil

127M

Russia

90M

Germany

72M

Mexico

68M

Nigeria

66M0 20 40 60 80 100

2025 Internet user map

Sizing Legend= 5M Internet Users

= 10M Internet Users

Percent Penetration of Internet Users Number of Internet Users

China

1.1B

USA

317M

India

708M

Brasil

173M

Russia

124M

Germany

74M

Mexico

106M

Nigeria

126M0 20 40 60 80 100

Systems of Intelligence

DIGITAL TRANSFORMATION

Engage your customers

Empower your employees

Optimize your operations

Transform your products

Page 2: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

IT’s role increases dramatically

IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION

TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS

TODAY

ERA 1 ERA 2 ERA 3

Sporadic automation and innovation; frequent issues

Services and solutions; efficiency and effectiveness

Digital business innovation; new types of service

The three pillars of cloud

REINVENTION OF PRODUCTIVITY

CREATING PERSONAL COMMUNITY

BUILDING INTELLIGENT CLOUD

“By 2020, a corporate‘no‐cloud’ policy will be as rare as a ‘no‐internet’ policy is today.”1

“The question is no longer:‘How do I move to the cloud?’ Instead, it’s ‘Now that I’m in the cloud, how do I make sure I’ve optimized my investment and risk exposure?”2

“By 2020 clouds will stop being referred to as ‘public’ and ‘private’. It will simply be the way business is done and IT is provisioned.”3

1Gartner: Smarter with Gartner, Why a No‐Cloud Policy Will Become Extinct, February 2, 20162KPMG: 2014 Cloud Survey Report, Elevating business in the cloud, December 10, 2014 3IDC: IDC Market Spotlight, Cloud Definitions and Opportunity, April 2015

“Businesses and users are going to embrace technology only if they can trust it.”

Satya NadellaChief Executive OfficerMicrosoft Corporation

Page 3: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

HOLISTIC APPROACH TO SECURITY

LEADERSHIP IN COMPLIANCE

COMMITMENT TOTRANSPARENCY & PRIVACY Platform PartnersIntelligence

9 BILLION new MCU devices built and deployed every year

Microcontrollers (MCUs)low-cost, single chip computers

Fewer than 1% of MCUs are connected today.

How does a consumer know the compressor in their fridge needs to be 

replaced?

Connected devices create profoundly better customer experiences.

Option 1Melted ice cream

Option 2Predictive maintenance

And, expose your business to unequalled risks…

Observations on October 21,2016 Botnet Attack

Device Security is a socioeconomic concernDAY 1 the attack is Technology headline in NY TimesDAY 2 the attack is Politics headline

The attack exploited well-understood weaknesses Weak common passwords, no early detection, no remote update, etc.

Future attacks could be much largerThis attack was small; just 100K devicesImagine a 100M-device attack

Future attacks could create huge liability exposureHackers could “brick” an entire product line in a dayActuating devices could cause property damage or loss of life

Page 4: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

The internet security battle.We’ve been fighting it for decades.We have experience to share.

© Microsoft Corporation

Hardware Root of Trust

Defense in Depth

Small Trusted Computing Base

Dynamic Compartments

Certificate-Based Authentication

FailureReporting

Renewable Security

The 7 properties of highly secured devices

© Microsoft Corporation

Some properties depend only on hardware support

Unforgeable cryptographic keys generated and protected by hardware

Hardware Root of Trust

• Hardware to protect Device Identity

• Hardware to Secure Boot

• Hardware to attest System Integrity

Hardware Root of Trust

© Microsoft Corporation

Internal barriers limit the reach of any single failure

Dynamic Compartments

• Hardware to Create Barriers• Software to Create Compartments

Some properties depend on hardware and software

Dynamic Compartments

Defense in Depth

Small Trusted Computing Base

© Microsoft Corporation

Device security renewed to overcome evolving threats

Renewable Security

• Cloud to Provide Updates• Software to Apply Updates• Hardware to Prevent Rollbacks

Some properties depend on hardware, software and cloud Certificate-Based

AuthenticationFailure

ReportingRenewable

Security

Azure Sphere empowers manufacturers to create highly-secured, connected MCU devices

Peace of mind

SECURITY

Every device built with Azure Sphere is secured by Microsoft. For its 10 year

lifetime.

Faster time to market

PRODUCTIVITY

The Azure Sphere developer experience shortens OEM time

to market.

The future is now

OPPORTUNITY

Azure Sphere empowers OEMs to create new customer

experiences and business models.

Page 5: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

© Microsoft Corporation

Azure Sphere Certified MCUs

The Azure Sphere OS

The Azure Sphere Security Service

Azure Sphere is an end-to-end solution for securing MCU powered devices

© Microsoft Corporation

Azure Sphere Certified MCUs from silicon partners, with built-in Microsoft

security technology provide connectivity and a dependable hardware root of trust.

© Microsoft Corporation © Microsoft Corporation

The Azure Sphere OS secured by Microsoft for the devices 10-year lifetime to create a trustworthy platform for new IoT experiences

© Microsoft Corporation © Microsoft Corporation

The Azure Sphere Security Service guards every Azure Sphere device; it brokers trust for device-to-device and device-to-cloud communication, detects emerging threats, and renews device security.

Page 6: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

Connected with built‐in networking

Secured with built‐in Microsoft silicon security technology including the Pluton Security Subsystem

Crossover real‐time and application processing power brought to MCUs for the first time 

Azure Sphere certified MCUs create a secured root of trust for connected, intelligent edge devices

ARM Cortex-MFor real-time processing

ARM Cortex-AOptimized for

low power

SRAM≥ 4MB

Network ConnectionWi-Fi in first chips

MicrosoftPlutonSecurity

Subsystem

Multiplexed I/O

SPII2CUARTI2STDMPWMGPIO ADC

FLASH ≥ 4MB

Firewall Firewall Firewall

Firewall Firewall Firewall

© Microsoft Corporation

Our Silicon Partners

Secure Application ContainersCompartmentalize code for agility, robustness & security

On‐chip Cloud Services Provide update, authentication, and connectivity

Custom Linux kernelEmpowers agile silicon evolution and reuse of code

Security MonitorGuards integrity and access to critical resources

The Azure Sphere OS is optimized for IoT, security, and agility

App Containers for POSIX (on Cortex-A)

App Containers for I/O (on Cortex-Ms)

OS Layer 4

On-chip Cloud ServicesOS Layer 3

HLOS KernelOS Layer 2

Security MonitorOS Layer 1

Azure Sphere MCUsHardware

Azure Sphere OS ArchitectureProtects your devices and your customers with certificate‐based authentication of all communication

Detects emerging security threats through automated processing of on‐device failures

Responds to threats with fully automated on‐device updates of OS

Allows for easy deployment of software updates to Azure Sphere powered devices

The Azure Sphere Security Service connects and protects every Azure Sphere device

Azure SphereSecurity Service

Other cloud or on-prem infrastructure

Azure

Your app updates

OS updates from Microsoft

App and OS updates

Remote attestation & cert based authentication

Online app and OS failure reports

App data and telemetry

App data and telemetry

Azure Sphere is open

pen to any MCU manufacturere are licensing our Pluton security subsystem royalty ee for use in any chip*

pen to any innovationCU manufacturers are free to innovate with our PL’d OSS Linux kernel code base

pen to any cloudzure Sphere devices are free to connect to Azure or any her cloud, proprietary or public for application data

Azure Sphere is Open.

Azure Sphere empowers manufacturers to create highly-secured, connected MCU devices

Peace of mind

SECURITY

Every device built with Azure Sphere is secured by Microsoft. For its 10 year

lifetime.

Faster time to market

PRODUCTIVITY

The Azure Sphere developer experience shortens OEM time

to market.

The future is now

OPPORTUNITY

Azure Sphere empowers OEMs to create new customer

experiences and business models.

Page 7: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

© Microsoft Corporation

Order Azure Sphere dev kits:1. Pre‐order available through end of August

2. Direct order begins in September

Attend an Azure Sphere event in your market:1. Azure Sphere at Ignite in Orlando, FL

2. IoT in Action event series in: DE, JP, AU, CN, ES, TW, US

Stay up to date on Azure Sphere:1. Learn how the seven properties can 

secure your products

2. Discover videos and helpful materials

What’s Next

Find an IoT in Action event near you.Check out Azure Sphere articles on

Forbes, the Wall Street Journal, and PC Magazine.

Visit the Azure Sphere website to learn more about the IoT

revolution.

Place your dev kit order and request a call with one of our

dedicated agents.

Actors Objectives Actions Impacts

71%of companies admit they fell victim to a 

successful cyberattack the prior year

Cyberattacks cause immense costs

$400bncost of cyberattacks to companies each year

160mData records 

compromised from top 8 breaches 

in 2015

140+Median # of days 

between infiltration and detection 

$3tr estimated economic cost of 

cyberattacksby 2020

556mvictims of cybercrime 

per year

REDUCED INNOVATION

Cyberattacks also create wider problems

CONTENT RELATED CRIME, AND EXTREMIST RECRUITING

SIGNIFICANT ORGANIZED CRIME 

ELEMENT DISRUPTION AND DANGERS TO CRITICAL INFRASTRUCTURE AND SYSTEMS

DECREASEDTRUST

INVASIONS OF PRIVACY IMPACT 

GOES BEYOND FINANCES 

Government response

Page 8: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY

Security response

Rising International Insecurity

Increasing Regulatory Pressure

Innovation at Risk

42 countries with defensive capabilities

95 countries developing legislative initiatives

40% of world population lives in countries with IoT strategy

17 countries with declared offensive capabilitiesPROTECTOR USER

MONITOREXPLOITER

50+ Countries with Defensive Capabilities

38+ Countries with Offensive Capabilities

95+ Countries Developing Legislative Initiatives

70+ Countries with Cybersecurity Strategies

Governments heavily involved in cyberspace

Germany~$1.1bn

China~$1.5bn

Russia<$300m

USA<$6.7bn

UK~$2bn

N. Korea~$200m

Iran~$1bn

ESTIMATED SPENDING ON CYBER OPERATIONS

USER PROTECTOR EXPLOITER LEGISLATOR

Government sponsored cyberattacks are increasing

DDoS against Estonia

Russo‐Georgian war

‘Cast Lead’ and ‘Pillar of Defense’ (Israel/Palestine)

GhostNet

Operation Aurora

Stuxnet

India – Pakistan cyber war

Jasmine Revolution

Sony Heartbleed security bug

Yahoo!Japan Pension Service  Montenegro

Russian banks

Norway

Sony

OPMUSA ‐ ISIS

US presidential elections  

North Korea Ukraine power grid

ADP Czech MFA

2007 2011 2014 20162008 2009 2010 2012 2013 2015 2017

North Korea –South Korea

Saudi Aramco and RasGas

WannaCry

Risk to civilians from cyber‐conflict needs a response 

Our call to action

Undertake to create politically binding then legally binding agreements committing governments to certain, acceptable behaviors in cyberspace. 

Drive forward a tech sector accord that commits the ICT industry to objectives and actions that will protect users and the wider internet, and will ensure the sector’s neutral status in any cyber‐conflict.

Support the establishment and operation of politically‐neutral, independent, transparent and peer‐reviewed accountability organization.

Identify and provide avenues for multi‐stakeholder input and involvement in the development of cyberspace policies and agreements.

Page 9: Shaping tomorrow’s cybersecurity landscape increasingly ... · IT CRAFTSMANSHIP INDUSTRIALIZATION DIGITAL TRANSFORMATION TECHNOLOGY FOCUS PROCESS FOCUS BUSINESS MODEL FOCUS TODAY