una estrategia para la ciberdefensa · next future: digital transformation with machine learning,...

13
pandasecurity.com Una estrategia para la ciberdefensa José Sancho Presidente de Panda Security

Upload: others

Post on 25-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

pandasecurity.com

Una estrategia parala ciberdefensaJosé SanchoPresidente de Panda Security

Page 2: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Money Makes The World Go Around = Competition

Panda Security

Page 3: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Wealth of Nations.Next Future: Digital Transformation with Machine Learning, Data and Sensors.

Current Competitive Advantage

Technology

Software Data Connection

Basic Functions of

Companies

Production Sales Management

CollectTaxes

ManageWelfare

Defend CompetitiveAdvantage

Duties of

Nations6Panda Security

Page 4: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Cuenta bancaria Router Teléfono Switch ATM Billetes Usuarios

• MOVE “A” to “B”

• ASSMB

• Binario

Programas

Money = Software = Vulnerabilities

Panda Security

Page 5: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Nations are the Prime Actors.Motives, Resources & Occasions.

8

Listed Companies

Products$30Bn

SymantecPalo Alto

Fortinet

SplunkCheckpointQualys

HuaweiNetwork

KasperskyEndpoint

Over 80% of the Industry Not Allowed in US Not Allowed in US GovLegal Agencies

Services$60Bn

Booz AllenScience

AppsLeidos

CSRACACIEgility

- -Revenue

PayrollUS Gov.

Agencies

> $40Bn> 200k FTE> 90% of Activity

Panda Security

Page 6: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

CIA Leaks:March 2017.Organization structure completely integratedwithin the CIA:

• Engineering Development Group (EDG)• Applied Engineering Division (AED)

• Embedded Development Branch (EDB)• Remote Development Branch (RDB)• Operational Support Branch (OSB)• Mobile Development Branch (MDB)• Automated Implant Branch (AIB)

• SED• Network Devices Branch (NDB)

• CCI Europe Engineering

Developers trained on how to evade security protections.

Microsoft’s secret database hack in 2013.Published Oct. 2017

• Microsoft's (NASDAQ:MSFT) secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group in 2013, according to five former employees, in only the second known breach of such a corporate database.

• Spies for governments around the globe and other hackers are said to covet such information because it shows them how to create tools for electronic break-ins.

Generation, Search and Acquisitionof 0-Day vulnerabilities.

Zerodium, Langley

9Panda Security

Page 7: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Cyberwar: The New Weapons.Robbery: “Taking the property of another, with the intent

to permanently deprive them of that property.”2017.08

ConstantEquifaxRansomware

Extortion: “Practice of obtaining something, especially money, through force or threats.”

2017.05 2017.062017.10

WannaCryNotPetyaBad Rabbit

Fake News: “Influence the voters of a country for the benefit of a foreign power.”

20162017

US ElectionsCatalonia

Espionage: “Act of secretly extract sensitive or protected information.”

2013.10 Smartphones of certain European leaders.

Sabotage: “Deliberate attempt to weaken or disable an economic or military system.”

2012.08 Shamoon infected 30,000 computers of Aramco disrupting its operations for more than 2 weeks.

End Result Transfer of Wealth

7Panda Security

Page 8: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Programas

ConfianzaCero

Personas URL

Datos

Attack Triangle

Panda Security

Page 9: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Hércules Poirot

Chess

• El Dioni

• The Great Train Robery

• Topkapi

Panda Security Vision

Panda Security

Page 10: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Panda Security

Foundation Technology

• Agente Universal

• Unidad de Inteligencia Analítica

• Servicio Base

• Plataforma de Operación y Gestión Única

Page 11: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

The Cybersecurity Landscape is vast an dynamic. We have vigilantly covered the sector for over two decades.

Panda Security

Cyberescape: The Cybersecurity Landscape

Page 12: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

Cybersecurity Maturity Level vs Budget

13Panda Security

Page 13: Una estrategia para la ciberdefensa · Next Future: Digital Transformation with Machine Learning, Data and Sensors. ... “Taking the property of another, with the intent ... Cybersecurity

pandasecurity.com

ReinventingCybersecurity.