trends in cybersecurity · trends in cybersecurity what history teaches and where the future will...
TRANSCRIPT
![Page 1: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/1.jpg)
Trends in CybersecurityWHAT HISTORY TEACHES AND WHERE THE FUTURE WILL LEAD US
JASON INGALLS MAY 22, 2017FOUNDER, CEOINGALLS INFORMATION SECURITY IINFOSEC.COM
![Page 2: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/2.jpg)
Cybersecurity: Protecting DataData Communication, Storage, Processing We use data to make decisions
We make decisions faster when we have trustworthy access to secure data and communications
We eventually automate decisions and actions that have known outcomes
We are doing this more and more with more important things: Weapon Systems
Public Transportation
Healthcare
![Page 3: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/3.jpg)
Cybersecurity Objectives
In order to protect data, communication and automation, we must meet three major objectives: Confidentiality: We must trust the
system to respect privileged access
Integrity: We trust the system to do what it was designed to do
Availability: We trust the system to be there when we need it
![Page 4: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/4.jpg)
Evolution OfHacker Culture
1980’s: Phreakers& Hackers
1990’s: Hackers& Script Kiddies
2000’s: Script Kiddies & Organized Crime
2010’s: Hacktivists & Advanced Persistent Threats
![Page 5: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/5.jpg)
Troubling Implications The Cybercrime Growth Curve
Source: 2016 Verizon Data Breach & Incident Response Report
![Page 6: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/6.jpg)
Problem #1: Not Enough Talent
360,000 Open cybersecurity jobs in U.S. as of August, 2016
1,000,000 Job Openings Worldwide
Not enough current college programs to close the gap
![Page 7: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/7.jpg)
Problem #2: Too Much Data
Cybersecurity tools can collect up to 10 billion bits per second (10 Gbps)
Fills up a 4 Terabyte drive in less than an hour
Most of this data is useless Investigating an attack in all this
data becomes very difficult Data is being created on an
exponential scale
![Page 8: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/8.jpg)
Working Towards The Future
Long term solution: get kids interested in cybersecurity, produce workforce
Mid-term solution: Create better cybersecurity tools
Immediate solution: Encourage everyone to practice good cybersecurity in personal and professional lives
If you and your friends are being chasedby a bear, you don’t have to be thefastest, you just can’t be the slowest.
That’s cybersecurity today.
![Page 9: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/9.jpg)
The Future: Sharing Threats and Creating Risk Pools Information Sharing and Analysis
Organizations (ISAOs): Standards-based organizations that
provides membership with help on cyber
Formerly known as ISACs, now with Federal guidance
Can be co-op, private, or non-profit Allows for risk-based analysis and
decisions on larger data sets
![Page 10: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/10.jpg)
The Future: Trusted Security Protects Our Privacy Security is required for assured privacy
It must be trusted It must be transparent where possible
Anything you put on the Internet never goes away What about right to be forgotten? Audit requirements ensure privacy
Companies will be forced to bargain beyond free services for user data As soon as people remember their most
valuable possession is their identity and privacy
“There goes John again…”
![Page 11: Trends in Cybersecurity · trends in cybersecurity what history teaches and where the future will lead us jason ingalls may 22, 2017 founder, ceo ingalls information security iinfosec.com](https://reader033.vdocument.in/reader033/viewer/2022051823/5fedcb810cc99547253fab9d/html5/thumbnails/11.jpg)
The Far Horizon: Artificial Intelligence
Which One?
In a recent poll, computer scientists were asked if we could expect General Artificial Intelligence by 2050.
Most said yes.Next question: