df2020 cyber security know-how unlocked final
TRANSCRIPT
Df2020 Ltd. Company Number 08885942. Web: http://df2020.com/ © Df2020 Ltd 2015
Contact Details: John Rawlings; M: +44 (0) 7768 875958; E: [email protected]
Cyber-Security: Know-How. Unlocked.
Decisions Made Simple
INTRODUCTION
‘Decisions Made Simple’ for every individual is now a feasible aspiration. Df2020 is an innovative
early stage firm that is using a combination of mobile and cloud to pioneer a concept called User
Generated Interactive Content. Our products are designed for the codification (Df2020 Author),
interaction (Df2020 Viewer) and measurement (Df2020 Cloud) of procedural knowledge.
VISION
Cyber-Security knowledge is designed to make contextual decisions simpler for individuals globally
and that the emergent patterns accelerate positive change.
THE CHALLENGE
The worldwide Cyber-Security market is estimated to be worth $77 billion in 2015 rising to $170 billion
by 2020.
A recent Verizon data breach study reported that human error was the cause in 66% of all cases.
These errors are often not made by the minority of those with experience or training, but appear to be
made by those who have not been educated or trained to cope with the new and varying techniques
being employed by those intent on using Cyber-Crime for their benefit and taking advantage of Cyber-
Security weaknesses.
Better designed procedures are needed to counter human vulnerability, which is one of the critical
weaknesses in the fight against Cyber-Security risks.
KEY INSIGHTS
Cyber-Security is the protection of information systems from theft or damage to the hardware, the
networks, the software, and to the data on them as well as disruption, misdirection or manipulation of
the services they provide. This includes all operators and users of these systems whether intentional,
accidental or due to them being tricked into deviating from Cyber-Security procedures. Equally
important are missing, incomplete, error prone or inaccessible Cyber-Security procedures that are
likely to increase poor or inappropriate decisions being made, especially under stressful conditions.
Weaknesses in Cyber-Security procedures increase the threat to infrastructure (such as pipelines,
power supplies, water treatment) and from identity theft, cyber-crime, money laundering and the
financing of terrorism at a scale that threatens to destabilise socioeconomic capabilities on a global
scale.
Some interesting insights:
Between US$1.44 trillion to US$3.59 trillion is being laundered every year
Df2020 Ltd. Company Number 08885942. Web: http://df2020.com/ © Df2020 Ltd 2015
Contact Details: John Rawlings; M: +44 (0) 7768 875958; E: [email protected]
Identity theft costs continue to grow after surpassing $3bn a year
You can buy credit and debit card details for $5 on the dark-web
You can buy health insurance cards for $50 on the dark-web
Lloyd’s: Cyber-Attacks cost businesses $400bn+ per annum
World Economic Forum: a lot of Cyber-Crime goes undetected
Kaspersky Labs: Cyber-Criminals stole ~$1bn from 100 financial firms
Alcatel-Lucent: 2014: 16m mobiles infected by malicious software
Lloyds: insurance took in $2.5bn in premiums for Cyber-Crime policies
Forrester Research: predict $100 million Cyber-Insurance policies soon
Symantec: Cyber-Security workforce to reach 6m globally by 2019
Cisco: current shortfall of 1m Cyber-Security personnel
Stanford University: USA 209,000 Cyber-Security jobs are unfilled
DB Networks: traditional manual approaches are unsustainable
Turkish pipeline exploded by remote control, by some kind of hack
PWC: 75% of large organizations suffered a staff-related breach
THE NEW APPROACH
Our goal is for experts to develop interactive Cyber-Security procedures using Df2020 Author. The
~235 m business around the world can use Df2020 Viewer to interact with these guides. These
interactions will drive anonymous, data audits for analysis of patterns related to choices, pathways
and outcomes. The emergent evidence would improve the fight against Cyber-Security risks using
shorter change cycles through better education, research, treatment and behavioural influences.
THE NEXT STEPS
Ideally, we are seeking early adopter individuals or organisations for the roles defined below, to
pioneer codification, interaction and measurement of Cyber-Security knowledge to help our ‘decisions
made simple’ goal and thereby contributing in the fight against identity theft, Cyber-Crime, money
laundering, the financing of terrorism and protecting our infrastructures and much more. The key roles
are:
Expertise to develop interactive Cyber-Security procedures
Individuals to interact with these procedures and provide feedback
Researchers to analyse the anonymous interactive data usage of these procedures
FURTHER INFORMATION
Web: http://df2020.com/
Video: https://www.youtube.com/watch?v=dyFOAguMOtU