THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and - - PowerPoint PPT Presentation

the evolving cyber threat landscape
SMART_READER_LITE
LIVE PREVIEW

THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and - - PowerPoint PPT Presentation

THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and Value of Information Sean Kanuck Director of Cyber, Space and Future Conflict The International Institute for Strategic Studies NATO Parliamentary Assembly Warsaw, Poland 27


slide-1
SLIDE 1

THE EVOLVING CYBER THREAT LANDSCAPE :

Ensuring the Integrity and Value of Information

Sean Kanuck Director of Cyber, Space and Future Conflict The International Institute for Strategic Studies NATO Parliamentary Assembly Warsaw, Poland 27 May 2018

slide-2
SLIDE 2

“ In short, the cyber threat cannot be eliminated; rather, cyber risk must be

  • managed. ”

Director of National Intelligence Worldwide Threat Assessment 26 February 2015

“ Future cyber operations will almost certainly include an increased emphasis

  • n changing or manipulating data to

compromise its integrity (i.e., accuracy and reliability) … ”

Director of National Intelligence Worldwide Threat Assessment 9 February 2016

Functionality ≠ Security People + Processes + Technology Offense > Defense Interests ↔ Actions ↔ Incentives

slide-3
SLIDE 3

STRATEGIC TRENDS

Intervention -- offensive operations below level of armed conflict Industry -- private sector companies are enablers, targets, and victims Infrastructure -- automation, lower resiliency, higher volatility Indirect -- opportunism, collateral damage, cascading effects Integrity -- data manipulation and fabricated information campaigns

SALIENT MILESTONES ( 2016 – 2018 )

Fake News -- Russian influence

  • perations and social media

Fake Crime -- WannaCry / NotPetya disrupted systems worldwide Real News -- EU data regulation, Equifax, and Meltdown / Spectre Real Crime -- US Securities and Exchange Commission disclosure Realism -- UN Group of Governmental Experts lacked consensus

slide-4
SLIDE 4

technological convergence cross-sectoral interdependence upstream / downstream integration assume compromised environment plan for cascading effects avoid single “points” of failure

RISK ENVIRONMENT IMPROVING RESILIENCE

increasing rate of change recognize cumulative costs

slide-5
SLIDE 5

D E C E N T R A L I Z E D “ These threats are amplified by our ongoing delegation of decision-making, sensing, and authentication roles to potentially vulnerable automated systems. ”

Director of National Intelligence Worldwide Threat Assessment 11 May 2017

I N S E C U R E A U T O M A T E D

IoT + AI = Potential Volatility

B I – D I R E C T I O N A L

slide-6
SLIDE 6

Threats to Data Integrity

FINANCIAL INSTITUTIONS INDUSTRIAL CONTROL SYSTEMS HEALTHCARE PROVIDERS Fraudulent SWIFT transfers (Bangladesh, India) European vendor software updates compromised Ransomware attacks that alter rather than encrypt data

slide-7
SLIDE 7

Threats to Information Integrity

DEMOCRATIC INSTITUTIONS CAPITAL MARKETS PUBLIC SAFETY Fraudulently influence voter turnout and/or ballots Misinform investors and/or regulators Mass migration in India resulted from social media post

slide-8
SLIDE 8

Technical Defense Measures

Biometric Identification Blockchain Artificial Intelligence Quantum Encryption Authentication Provenance Detection Protection Non-repudiation Verification Deception Notification

slide-9
SLIDE 9
  • Rigorously employ cyber security

“best practices”

  • Create additional resilience through

redundancy in order to recover from adverse events

  • Utilize a threat analysis model that

adopts an attacker’s perspective of your organization and its external dependencies

  • Develop a business strategy that is

cognizant of information challenges and prepare contingency plans

Preserving Information Integrity

slide-10
SLIDE 10

Q & A