are you prepared? cybersecurity trends & opportunities (ed valdez)
TRANSCRIPT
ì Cybersecurity Trends & Opportunites By Ed Valdez, CSO of Ecotech Ventures
1 © 2015 Ed Valdez August 5, 2015
ì Ed Valdez Brief Bio
2 © 2015 Ed Valdez August 5, 2015
Quiz: What City is This?
3 © 2015 Ed Valdez August 5, 2015 Image: Ed Valdez (Aug., 2015)
Where are the Cybersecurity Threats?
4 © 2015 Ed Valdez August 5, 2015
Source: Forbes (Aug., 2015)
3 Pillars of Cybersecurity
5
Source: IT Governance (UK)
© 2015 Ed Valdez August 5, 2015
U.S. Government Update 1
6 © 2015 Ed Valdez August 5, 2015 Source: Nextgov (Aug., 2015)
U.S. Government Update 2
7 © 2015 Ed Valdez August 5, 2015 Source: Nextgov (Aug., 2015)
Key Questions for Financial Institutions
8
Key Ques0ons Directors Must Ask Cybersecurity Chiefs • What was our most significant cybersecurity incident in the past quarter?
What was our response? • What was our most significant near miss? How was it discovered? • How is the performance of the security team evaluated? • Do you have relaWonships with law enforcement, such as the FBI and Interpol? • Do you work with business leaders on due diligence of acquisiWon targets?
With supply chain leaders on security protocols of vendors and other partners? • What process is in place to ensure you can escalate serious issues and provide prompt,
full disclosure of cybersecurity deficiencies? (Source: NaWonal AssociaWon of Corporate Directors)
© 2015 Ed Valdez August 5, 2015
What Can We Learn from Retail?
9 © 2015 Ed Valdez August 5, 2015 Source: Security Intel. (Aug., 2015)
Automotive Hacking
10 © 2015 Ed Valdez August 5, 2015 Source: Wired (Aug., 2015)
IT Disruption
11 © 2015 Ed Valdez August 5, 2015
Mobile Devices Everywhere
12 © 2015 Ed Valdez August 5, 2015
Mobile Internet Trends
13 © 2015 Ed Valdez August 5, 2015 Source: KPCB (May, 2015)
Why China’s Influence Matters
14
Investment Requirements • Easy-‐to-‐follow story with simple dialog that translates well • No poliWcal messages • InternaWonal venue with grand cinematography
© 2015 Ed Valdez August 5, 2015 Image: Paramount Pictures (August, 2015)
China’s Proposed Cybersecurity Law
15
Proposed Changes • Require companies to censor
and restrict online anonymity; • Require companies to store user data in China; • Require companies to monitor and report
to the government undefined “network security incidents”
© 2015 Ed Valdez August 5, 2015 Source: Reuters (July, 2015)
6 Trends in Cybersecurity Breaches
16
• Insider Misuse = Significant Cause of Breaches (20%) • Mobile Devices Used to Harvest Data (Adware now in 410,000 apps) • Mobile Device Management can Prevent Breaches (22% involve stolen devices) • Human Focus is CriWcal: 4 out of 5 companies don’t update Breach protocols • Security Skills are lacking in Enterprise Security (30% cite criWcal shortage) • Disclosures from Outside Sources: 69% of Breaches are noWfied by outside agency (Not users)
© 2015 Ed Valdez August 5, 2015 Source: KPCB (May, 2015)
Investments & Acquisitions
17
1H 2015 Acquisi0ons • Cisco Acquires OpenDNS • Microsoh acquires Adallom • Baidu acquires Anquanbao • AVG Technologies acquires Privax • CounterTack acquires ManTech Cyber SoluWons • Cypher Cloud acquires Anicut Systems And many more….
© 2015 Ed Valdez August 5, 2015
Call to Action
18
• IdenWfy the next best Industry OpportuniWes • Get back to the basics: Government agency opportuniWes • How do we expand internaWonally? What is the best Wming? • What’s the Value of our Team? • How do we idenWfy mulWpliers to the business?
© 2015 Ed Valdez August 5, 2015
Thank you
19
Ed Valdez Ecotech Ventures [email protected] Twiker: @edvaldez8888 Samsung 3.0: Talent, Technology and Timing
© 2015 Ed Valdez August 5, 2015
Note: All trademarks or registered trademarks are the property of their respecWve owners.