una estrategia para la ciberdefensa · next future: digital transformation with machine learning,...
TRANSCRIPT
pandasecurity.com
Una estrategia parala ciberdefensaJosé SanchoPresidente de Panda Security
Money Makes The World Go Around = Competition
Panda Security
Wealth of Nations.Next Future: Digital Transformation with Machine Learning, Data and Sensors.
Current Competitive Advantage
Technology
Software Data Connection
Basic Functions of
Companies
Production Sales Management
CollectTaxes
ManageWelfare
Defend CompetitiveAdvantage
Duties of
Nations6Panda Security
Cuenta bancaria Router Teléfono Switch ATM Billetes Usuarios
• MOVE “A” to “B”
• ASSMB
• Binario
Programas
Money = Software = Vulnerabilities
Panda Security
Nations are the Prime Actors.Motives, Resources & Occasions.
8
Listed Companies
Products$30Bn
SymantecPalo Alto
Fortinet
SplunkCheckpointQualys
HuaweiNetwork
KasperskyEndpoint
Over 80% of the Industry Not Allowed in US Not Allowed in US GovLegal Agencies
Services$60Bn
Booz AllenScience
AppsLeidos
CSRACACIEgility
- -Revenue
PayrollUS Gov.
Agencies
> $40Bn> 200k FTE> 90% of Activity
Panda Security
CIA Leaks:March 2017.Organization structure completely integratedwithin the CIA:
• Engineering Development Group (EDG)• Applied Engineering Division (AED)
• Embedded Development Branch (EDB)• Remote Development Branch (RDB)• Operational Support Branch (OSB)• Mobile Development Branch (MDB)• Automated Implant Branch (AIB)
• SED• Network Devices Branch (NDB)
• CCI Europe Engineering
Developers trained on how to evade security protections.
Microsoft’s secret database hack in 2013.Published Oct. 2017
• Microsoft's (NASDAQ:MSFT) secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group in 2013, according to five former employees, in only the second known breach of such a corporate database.
• Spies for governments around the globe and other hackers are said to covet such information because it shows them how to create tools for electronic break-ins.
Generation, Search and Acquisitionof 0-Day vulnerabilities.
Zerodium, Langley
9Panda Security
Cyberwar: The New Weapons.Robbery: “Taking the property of another, with the intent
to permanently deprive them of that property.”2017.08
ConstantEquifaxRansomware
Extortion: “Practice of obtaining something, especially money, through force or threats.”
2017.05 2017.062017.10
WannaCryNotPetyaBad Rabbit
Fake News: “Influence the voters of a country for the benefit of a foreign power.”
20162017
US ElectionsCatalonia
Espionage: “Act of secretly extract sensitive or protected information.”
2013.10 Smartphones of certain European leaders.
Sabotage: “Deliberate attempt to weaken or disable an economic or military system.”
2012.08 Shamoon infected 30,000 computers of Aramco disrupting its operations for more than 2 weeks.
End Result Transfer of Wealth
7Panda Security
Programas
ConfianzaCero
Personas URL
Datos
Attack Triangle
Panda Security
Hércules Poirot
Chess
• El Dioni
• The Great Train Robery
• Topkapi
Panda Security Vision
Panda Security
Panda Security
Foundation Technology
• Agente Universal
• Unidad de Inteligencia Analítica
• Servicio Base
• Plataforma de Operación y Gestión Única
The Cybersecurity Landscape is vast an dynamic. We have vigilantly covered the sector for over two decades.
Panda Security
Cyberescape: The Cybersecurity Landscape
Cybersecurity Maturity Level vs Budget
13Panda Security
pandasecurity.com
ReinventingCybersecurity.