Cyber strategy brief - storage.googleapis.comThe Stonesoft Mission “to protect and save lives and...

Preview:

Citation preview

Cyber strategy brief Balance of risks and opportunities

These are computers in the internet

This is a computer in the Internet

This is a “fly-by-wire” piece of equipment

THE DIGITAL WORLD OF BITS. IN OUR SOCIETY THE DIGITAL AND

PHYSICAL ARE INTEGRATED.  

“cyber”

MI6  recrui*ng  example  

MI6 quote  

“The future of America’s security is

in this room”  General  Keith  Alexander  in  Defcon  

“…cyber security ranks alongside

terrorism”  

Recruiting 500k ‘Cyber warriors” in the next 5 years  

MI5  chief  Jonathan  Evans   Indian  Government  in  2012  

Cyberwar in action: israel gaza conflict

“In the past four days, Israel had ” deflected 44 million cyber attacks on government websites” - Finance minister Steinitz during the Gaza conflict in 2012

Cyber Crime has become an Industry worth more than drug traficking ($400+ bn/year)

Equal to corruption or accounting frauds...

…costing on average $5.9 million/year for every

corporation

1. Our dependency and vulnerability of world of bits

Why cyber security is now a hot topic?

2. State actors and resources

3. Threat and remedy arms race

4. Cost effectiviness and ease of use

WHAT IS SECURITY? Reality How things really are? Feeling Are we safe? Model How do we protect ourselves? - technologies - competences - processes

“007, I can do more damage on my laptop, sitting in my pajamas, before my first cup of Earl Grey

than you can do a year in the field.” -Q

Reality has changed

No  geographical  distances  

•  Proximity  does  not  ma9er    

Deterrence  not  based  on  material  power  

• Competence  ma9ers  • Assessment  difficult  

Li9le  reac.on  .me  for  defense  

•  No  early  warning  

A2ribu.on  problems  •  Escala*on  risk  from  

responses  

Reality has changed

THE DYNAMIC THREAT LANDSCAPE  

Military/political influence

Political change

Intellectual property gain

Financial gain

Ego, curiosity and change

Military/political dominance

Advanced states

Terrorist networks and groups

Nation-states and enterprises

Criminals

Hacker groups and individuals

Advanced cyber-nation- states

Critical infra, military and political assets

Infrastructure, assets and public places

Governments, companies and individuals

Companies and individuals

Governments, companies and individuals

Critical infra, military and political assets

Motivation Actors Target

TACTICAL CYBER WAR

TERRORISM

ESPIONAGE

ORGANIZED CRIME

VANDALISM, HACKTIVISM

STRATEGIC CYBER WAR

3. Cyber world is a great opportunity

Why to take this seriously

2. Threats are real and current

1. The most important factor to change our security thinking

Strategic level

Operative level

Technology level

Problem of disconnect

Strategic level

Operative level

Capability level

   

GU

IDA

NC

E

Next step: balanced cyber strategy

Step 1. STRATEGIC LEVEL

Contents: •  Cyber exposure

•  Importance for future

• Opportunities & threats

Step 2. OPERATIVE LEVEL

Contents: •  Enablement plan •  Security plan …for important example cyber issues

Step 3. CAPABILITY LEVEL

Contents: •  First capability needs

identified for Enablement and Risk plans

1.  Change the way of thinking

2.  Real time situational awareness

3.  Centralised control

4.  Dynamic thinking and solutions

5.  Preparedness for unknown threats

6.  Resilience

7.  Optimize resource usage

Typical outcomes of cyber strategy workshops

“We believe the most exciting

developments in cyberspace

are still to come…”

The Stonesoft Mission

“to protect and save lives and

businesses in cyber space”

Network security from Stonesoft

Datacenters and cloud Mission critical networks Classified data and IPR

Financial transactions & assets

Business continuity & applications

Multi-location businesses & services

Committed to protecting customers’

Cyber strategy brief Balance of risks and opportunities

Cyber strategy brief Balance of risks and opportunities

Recommended