the future of cyber security - matthew rosenquist

17
Matthew Rosenquist Cybersecurity Strategist and Evangelist Intel Corporation November 10th, 2015

Upload: matthew-rosenquist

Post on 16-Apr-2017

1.330 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The Future of Cyber Security - Matthew Rosenquist

Matthew RosenquistCybersecurity Strategist and Evangelist Intel Corporation

November 10th, 2015

Page 2: The Future of Cyber Security - Matthew Rosenquist

Biography

2

Matthew RosenquistCybersecurity Strategist and EvangelistIntel Corp

Matthew benefits from 20+ years in the field of security, specializing in strategy, threats, operations, crisis management, measuring value, communicating industry changes, and developing cost effective capabilities which deliver the optimal level of security. As a cybersecurity strategist, he works to understand and communicate the future of security and drive industry collaboration to tackle challenges and uncover opportunities to significantly improve global computing security.

Mr. Rosenquist built and managed Intel’s first global 24x7 Security Operations Center, overseen internal platform security products and services, was the first Incident Commander for Intel’s worldwide IT emergency response team, and managed security for Intel’s multi-billion dollar worldwide mergers and acquisitions activities. He has conducted investigations, defended corporate assets, established policies, developed strategies to protect Intel’s global manufacturing, and owned the security playbook for the PC strategic planning group. Most recently, Matthew worked to identify the synergies of Intel and McAfee as part of the creation of the Intel Security Group, one of the largest security product organizations in the world.

Twitter @Matt_RosenquistLinkedIn: MatthewRosenquistBlogs Intel IT Peer Network

Page 3: The Future of Cyber Security - Matthew Rosenquist

Agenda

3

The Emerging Future of Cybersecurity

Changing Digital World

Cybersecurity Forecast

1. More sophisticated attackers

2. New targets and methods

3. Integrity attacks emerge

4. Relevance of the cumulative impact emerges

5. Cybersecurity expectations rise, resources don’t keep pace

Recommendations

Page 4: The Future of Cyber Security - Matthew Rosenquist

The Emerging Futrue of Cybersecurity

4

Why Identify Important Trends?

To understand the challenges and opportunities

Why does it matter?

Allows us to prepare and make good choices tactically and strategically

What must we do?

Think ahead, plan, and lead

Let’s explore and discuss…

Page 5: The Future of Cyber Security - Matthew Rosenquist

Changing Digital World

5

Growing Number of Users: 4B connected people

More Users

New Devices

Innovative Usages

Generating Vast Data

Sensitive Functions

Increased Target Value

New Devices Types: 200B IoT devices

Innovative Usages and Access: 25M+ applications

Creation of Vast Amounts of Data: 50T gigabytes

Critical Functionality: Infrastructure, Defense, Transportation

Creates Targets with Increased Value

Page 6: The Future of Cyber Security - Matthew Rosenquist

6

Page 7: The Future of Cyber Security - Matthew Rosenquist

Attacker Sophistication

7

Nation states: technology reuse by others

Attackers increase in numbers and

capability, allowing for more advanced

attacks across a broader spectrum of

targets.

Organized criminals: success and gains encourage further campaigns

Specialization: Crime-as-a-Service, hacking, ID, data, validation, mules

Cooperation: across geo’s, sharing technology, dark markets

Resources: increase and reinvested to target more and new areas

Page 8: The Future of Cyber Security - Matthew Rosenquist

Attack Methods

8

Ransom & Malware: Rapidly on the Rise

New methods emerge,

successful methods are

improved.

The easiest victims and

targets with high value are at

greatest risk.

Malware-as-a-Service: Pay for technical expertise and access

Digital Credentials: Stolen & Misused Certificates, ID/Passwords

Vulnerability Markets: Research is on the rise, with better tools

Contextual Social Engineering: Aggregation of data to hack people

Data Breaches Expand: healthcare, legal, government, social media, and other digital services

Page 9: The Future of Cyber Security - Matthew Rosenquist

Integrity Attacks Emerge

9

Integrity Based Attack: Selectively altering specific transactions to achieve a malicious goal.

Joins Confidentiality (Data Breaches) and Availability (DDOS) based attacks

Security solutions are not prepared for

Integrity based attacks

Difficult to prevent, detect, and

effectively recover

Banking: Carbanak $300m-$1B

Crypto-Ransomware: CryptoWall$18M (2014) to $325M (2015)

State sponsored malware: Stuxnet, Duqu, Flame, Gauss family

Transportation: Vehicle attacks & exploitation proof-of-concepts

Page 10: The Future of Cyber Security - Matthew Rosenquist

Relevance of Cumulative Impact

10

Viewed as a set of tactical problems

Industry currently fails to see the overall

impact.

New emphasis will emerge to understand

the systemic costs of cybersecurity risks.

What does cybersecurity cost?

+ Security solutions spending, human talent costs, audit and compliance

+ Incident response, repair of reputation, legal, and recovery

+ Secure design/test, customer apprehension. Delays in product release, tech adoption, and diversion of investments for growth

$400B, $3T, $12T, $90T, more?

Strategically, it is systemic and must be addressed at an ecosystem level

Page 11: The Future of Cyber Security - Matthew Rosenquist

Enterprises: shift to accept the market and reputation impactsof digital security

Cybersecurity Expectations Rise

11

Regulations: growing in complexity and risk of being an impediment to innovation

Expectations of cybersecurity will rise, but

the resources and capabilities will not keep

pace.

Leadership is key!

Market: demands for more connectivity, devices, architectures, and applications

Consumers: expect security “their way” with access anywhere to anything, while keeping them safe

Hiring Security Pro’s:resource pool empty, with 1.5M needed

Page 12: The Future of Cyber Security - Matthew Rosenquist

12

The challenges and implications for digital services and telecommunications

Page 13: The Future of Cyber Security - Matthew Rosenquist

13

Challenges and Opportunities

“Two types of victims exist:Those with something of value and those who are easy targets. ”

1. You are a rich target, expect all levels and manners of attacks

Don’t be the easy target. At a minimum follow industry best practices

Establish advanced capabilities based upon the threats you face

Identify and vigorously protect your valuable assets and capabilities

Page 14: The Future of Cyber Security - Matthew Rosenquist

14

Challenges and Opportunities

“Without leadership, we are left with crisis”

2. Lead and be smart

Have a leader, a plan, and the means to deliver

Be realistic, seek an optimal level of security

Establish a strategic capability plan to sustainably manage security

Page 15: The Future of Cyber Security - Matthew Rosenquist

15

Challenges and Opportunities

“Trust is earned in drips and lost in buckets”

3. Build security and trust into the business

Address risks of 3rd party vendors, suppliers, and partners

Design new infrastructures and products with security

Maintain vigilance with focus, expectations, and prioritization on security

Page 16: The Future of Cyber Security - Matthew Rosenquist

16

Intel, the Intel logo, and McAfee are trademarks of Intel Corporation in the United States and other countries.

*Other names and brands may be claimed as the property of others.

Copyright © 2015 Intel Corporation. All Rights Reserved

Page 17: The Future of Cyber Security - Matthew Rosenquist