adil burak sadıç - siber güvenlik mi, bilgi güvenliği mi, bt güvenliği mi?

30
Siber Güvenlik ? Bilgi Güvenliği ? BT Güvenliği ?

Upload: cypsec-siber-guevenlik-konferansi

Post on 20-Jul-2015

103 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

Siber Güvenlik ? Bilgi Güvenliği ? BT Güvenliği ?

Page 2: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

A. Burak Sadıç 1995

2003-2013

2014 yılında katıldığı PricewaterhouseCoopers Türkiye ofisinde

Bilgi Güvenliği ve Siber Güvenlik Hizmetleri Lideri olarak çalışan Burak’ın

yirmi senelik danışmanlık ve yönetim deneyimi bulunmaktadır. ODTÜ Elektrik-Elektronik Mühendisliği

bölümünden 1995 yılında mezun olan Burak, PwC öncesinde sırasıyla PDI-Erkom, Siemens, Meteksan, Koç.net,

Innova ve Symantec bünyesinde çeşitli kademelerde çalıştı. Symantec'teki 10 yıllık iş yaşamının son dört yılında ise

Güneydoğu Avrupa'daki 12 ülke ve Türkiye'yi kapsayan bölgedeki danışmanlık ekiplerini yönetti.

2014-…

Page 3: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

2

Page 4: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

3

Page 5: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

4

Page 6: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

5

Page 7: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

6

Page 8: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

7

Page 9: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

8

Page 10: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

9

Page 11: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

10

Page 12: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

Türkiye’deki gelişmeler

11

Page 13: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

12

Page 14: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

13

Page 15: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

14

“There are known knowns; there are things we know we know. We also know there are known unknowns, that is to say we know there are some things we do not know. But there are also unknown unknowns – the ones we don’t know we don’t know.”

Former United States Secretary of Defense Donald Rumsfeld

February 12, 2002

Page 16: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

15

Page 17: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Page 18: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

17

Page 19: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

18

THREAT HORIZON 2017

Dangers accelerate

Page 20: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

19

1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations.

1.1 Supercharged connectivity overwhelms defences

Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online.

1.2 Crime syndicates take a quantum leap

Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe.

1.3 Tech rejectionists cause chaos

In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.

Page 21: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

20

1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations.

1.1 Supercharged connectivity overwhelms defences

Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online.

1.2 Crime syndicates take a quantum leap

Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe.

1.3 Tech rejectionists cause chaos

In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.

Page 22: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

21

1. Disruption divides and conquers Innovation is bringing new opportunities for business, but also malicious actors that seek to disrupt operations.

1.1 Supercharged connectivity overwhelms defences

Reasonably-priced and superfast gigabit connectivity will provide new business opportunities. However, it will also open new avenues for criminals to pursue destructive activity online.

1.2 Crime syndicates take a quantum leap

Criminal organisations will become more sophisticated and migrate many of their activities online. Organisations will struggle to keep pace and the effects will be felt around the globe.

1.3 Tech rejectionists cause chaos

In response to socio-economic inequality, ‘tech rejectionists’ will instigate widespread social unrest and disrupt local economies. Organisations with supply chains in the affected regions will struggle to cope.

Page 23: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

22

2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure.

2.1 Dependence on critical infrastructure becomes dangerous

Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes.

2.2 Systemic vulnerabilities are weaponised

Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure.

2.3 Legacy technology crumbles

As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before.

2.4 Death from disruption to digital services

Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.

Page 24: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

23

2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure.

2.1 Dependence on critical infrastructure becomes dangerous

Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes.

2.2 Systemic vulnerabilities are weaponised

Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure.

2.3 Legacy technology crumbles

As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before.

2.4 Death from disruption to digital services

Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.

Page 25: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

24

2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure.

2.1 Dependence on critical infrastructure becomes dangerous

Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes.

2.2 Systemic vulnerabilities are weaponised

Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure.

2.3 Legacy technology crumbles

As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before.

2.4 Death from disruption to digital services

Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.

Page 26: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

25

2. Complexity conceals fragility A cyberspace congested with people and devices is becoming more complex, exposing the fragility of the underlying infrastructure.

2.1 Dependence on critical infrastructure becomes dangerous

Whole societies are dependent on ageing, poorly maintained and highly critical infrastructure. Connectivity failures will force organisations to update their resilience and invest in technology transformation programmes.

2.2 Systemic vulnerabilities are weaponised

Malicious actors will weaponise systemic vulnerabilities in software systems of individual technology companies, threatening the integrity of Internet infrastructure.

2.3 Legacy technology crumbles

As digital connectivity grows, legacy technology will be further exposed to attackers. The damage from the resultant incidents will exceed anything that has come before.

2.4 Death from disruption to digital services

Disruption of digital systems in transport and medical services will lead to verifiable deaths. Public pressure forces organisations to respond.

Page 27: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

26

3. Complacency bites back Organisations are too complacent, paying insufficient attention to threats concealed by international borders.

3.1 Global consolidation endangers competition and security

As the dominant providers of information services expand their global operations, customers will become more concerned about potential service disruptions and failures.

3.2 Impact of data breaches increases dramatically

Data breaches will grow in frequency and size, increasing the operational impact and recovery costs. In response, governments will introduce additional data protection legislation and regulations.

Page 28: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

27

3. Complacency bites back Organisations are too complacent, paying insufficient attention to threats concealed by international borders.

3.1 Global consolidation endangers competition and security

As the dominant providers of information services expand their global operations, customers will become more concerned about potential service disruptions and failures.

3.2 Impact of data breaches increases dramatically

Data breaches will grow in frequency and size, increasing the operational impact and recovery costs. In response, governments will introduce additional data protection legislation and regulations.

Page 29: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

28

Page 30: Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?

Teşekkürler...

Füsun Patoğlu [email protected] 0212 326 6144

burak.sadic @ tr.pwc.com

@adilburaksadic tr.linkedin.com/in/buraks/