the evolving cyber threat landscape
play

THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and - PowerPoint PPT Presentation

THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and Value of Information Sean Kanuck Director of Cyber, Space and Future Conflict The International Institute for Strategic Studies NATO Parliamentary Assembly Warsaw, Poland 27


  1. THE EVOLVING CYBER THREAT LANDSCAPE : Ensuring the Integrity and Value of Information Sean Kanuck Director of Cyber, Space and Future Conflict The International Institute for Strategic Studies NATO Parliamentary Assembly Warsaw, Poland 27 May 2018

  2. “ In short, the cyber threat cannot be “ Future cyber operations will almost eliminated; rather, cyber risk must be certainly include an increased emphasis managed. ” on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) … ” Director of National Intelligence Worldwide Threat Assessment 26 February 2015 Director of National Intelligence Worldwide Threat Assessment 9 February 2016 Functionality ≠ Security People + Processes + Technology Interests ↔ Actions ↔ Incentives Offense > Defense

  3. STRATEGIC TRENDS SALIENT MILESTONES ( 2016 – 2018 ) Intervention -- offensive operations Fake News -- Russian influence below level of armed conflict operations and social media Industry -- private sector companies Fake Crime -- WannaCry / are enablers, targets, and victims NotPetya disrupted systems worldwide Infrastructure -- automation, lower Real News -- EU data regulation, resiliency, higher volatility Equifax, and Meltdown / Spectre Indirect -- opportunism, collateral Real Crime -- US Securities and damage, cascading effects Exchange Commission disclosure Integrity -- data manipulation and Realism -- UN Group of fabricated information campaigns Governmental Experts lacked consensus

  4. RISK ENVIRONMENT IMPROVING RESILIENCE technological convergence assume compromised environment increasing rate of change recognize cumulative costs avoid single “points” of failure upstream / downstream integration cross-sectoral interdependence plan for cascading effects

  5. IoT + AI = Potential Volatility D E C E N T R A L I Z E D A I “ These threats are amplified by our ongoing U N delegation of decision-making, sensing, and T S authentication roles to potentially vulnerable O E automated systems. ” M C A U Director of National Intelligence T Worldwide Threat Assessment R 11 May 2017 E E D B I – D I R E C T I O N A L

  6. Threats to Data Integrity INDUSTRIAL CONTROL FINANCIAL INSTITUTIONS HEALTHCARE PROVIDERS SYSTEMS Fraudulent SWIFT transfers European vendor software Ransomware attacks that alter (Bangladesh, India) updates compromised rather than encrypt data

  7. Threats to Information Integrity DEMOCRATIC INSTITUTIONS CAPITAL MARKETS PUBLIC SAFETY Fraudulently influence voter Misinform investors and/or Mass migration in India resulted turnout and/or ballots regulators from social media post

  8. Technical Defense Measures Biometric Identification Authentication Non-repudiation Blockchain Provenance Verification Artificial Intelligence Detection Deception Quantum Encryption Protection Notification

  9. Preserving Information Integrity • Rigorously employ cyber security “best practices” • Create additional resilience through redundancy in order to recover from adverse events • Utilize a threat analysis model that adopts an attacker’s perspective of your organization and its external dependencies • Develop a business strategy that is cognizant of information challenges and prepare contingency plans

  10. Q & A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend