Brian David Johnson BDJ.Futurist@gmail.com @BDJFuturist A Widening Attack Plain Initial Cyber Threatcasting Report out for Mad Scientist Brian David Johnson.

Slides:



Advertisements
Similar presentations
Numbers 1-20.
Advertisements

Enablement kick off with Segme... 1 © 2014 IBM Corporation 1Q14 IBM SWG Sales Academy – ECM and ILG Sessions.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
Sixteen Squared. 256 One Squared 1 Three Cubed.
Multiplication Facts 9 through x 5= 50 Number One.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Introduction to the ECIR Initiative Nazli Choucri Professor of Political.
Global Heat-Resistant Gloves Industry 2015 Market Research Report Joel John 3422 SW 15 Street, Suit #8138, Deerfield Beach, Florida 33442, USA Tel:
Global Ball Mill Industry 2015 Market Research Report Joel John 3422 SW 15 Street, Suit #8138, Deerfield Beach, Florida 33442, USA Tel:
Global Lawn Lights Industry 2015 Market Research Report Joel John 3422 SW 15 Street, Suit #8138, Deerfield Beach, Florida 33442, USA Tel:
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Mantova 18/10/2002 "A Roadmap to New Product Development" Supporting Innovation Through The NPD Process and the Creation of Spin-off Companies.
Proportions Round One 2) x + 3 = 15 Answers 2.) x + 3 = 15 X=12 21.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Global Ammonium Bifluoride Industry 2015 Market Research Report Joel John 3422 SW 15 Street, Suit #8138, Deerfield Beach, Florida 33442, USA Tel:
Chapter 3 Strategic Information Systems Planning.
Framework for success workshop 1 st October 2009.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Global Chronic Care Products Industry Research Report 2015 Published By QYResearch Contact US: Web:
CLICK THE NUMBERS IN SEQUENCE
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Jeopardy Place Value Words- Number Value Number – Words What digit Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500.
What time is it ? in the morning / in the afternoon in the evening
START It’s two o’clock It’s a quarter to ten It’s five to eight It’s twenty to one.
2B: Unit 5 What time is it What time is it ? o’clock / half past.
2014 Deep Research Report on Global and China Industrial Naphthalene Industry Published: June 2014 Single User License: US$ 2200 Corporate User License:
Global 2-Ethylhexanol Industry Research Report 2015.
Today’s managers & leaders are challenged unlike any of the past generations in their roles.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security – An Existential Threat? (IIC, Singapore)
The vulnerability of economic markets to crime in 2015
The customer viewpoint - how University CIOs view NRENs
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Cyber Security: State of the Nation
Understanding the Threats of and Defenses Against Cyber Warfare
2017 Palmetto Cyber Defense Competition
Co-Teaching Strategies McDowell Principals October 20, 2016
What time is it? or What’s the time?.
We count one, two, three….
Chapter 13: Management Development
ESRC HIVE-PED Research Seminar Series
BUREAU VERITAS COMMODITIES
TWO MINUSES MAKE A PLUS (and other stories)
Building Three Timelines for the Refocus Process
Look at the clock. Thirteen One Fourteen Two Fifteen Three Sixteen
May 25, Week Thirty-Two May 18, Week Thirty-One.
March 10, Week Twenty-Two March 3, Week Twenty-One
Transforming organisations through an
Telling The Time.
NUMBERS one two three four five six seven eight
Tropical Storm Tracking
2019 Palmetto Cyber Defense Competition Pro Day Event – Monday, 15 April The Space and Naval Warfare Systems Center (SSC) Atlantic, the Navy’s East Coast.
Number word cards months
The Environment and Corporate Culture
WHAT’S THE TİME ? – WHAT TİME İS İT ?
Threatcasting Jon Brickey, Ph.D..
Numbers
September 14, Week Two September 7, Week One.
CLICK THE NUMBERS IN SEQUENCE
INNOVATION SUPERCLUSTERS INITIATIVE
Look at the clock. Thirteen One Fourteen Two Fifteen Three Sixteen
What time is it ? o’clock / half past 2B: Unit 5.
STRIKE THE NUMBER! PLAY.
MATHS TIME! nine ten eleven fifteen eight
CLICK THE NUMBERS IN SEQUENCE
Urban Infrastructure: Analysis and Modeling for Their Optimal Management and Operation NSF Workshop NSF Award #: Nada Marie Anid, Ph.D. Professor.
September 14, Week Two September 7, Week One.
CYBER RISKS IN SECURITIES SERVICES
*Separate register for CTF at:
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?
Presentation transcript:

Brian David Johnson BDJ.Futurist@gmail.com @BDJFuturist A Widening Attack Plain Initial Cyber Threatcasting Report out for Mad Scientist Brian David Johnson BDJ.Futurist@gmail.com @BDJFuturist

Contents Who am I? A Overview of the Futurecasting and Threatcasting Process Initial Report Out: ACI Threatcasting Next Steps

Who am I? Age 13

Who am I? Age 13

Who am I? Nerd! Age 13

Who am I? Nerd! NERD! Age 13

Futurecasting? - Isaac Asimov “Predicting the future is a hopeless, thankless task, with ridicule to begin with and, all too often, scorn to end with.” - Isaac Asimov

Futurecasting Process Data w/ an opinion Trends Technical SF Proto Vision for 2026 Future we want Future we want to avoid Social Uncertainty is the land of innovation Vision 2016 2026 Gate 2019 Flag 2023

Threatcasting Process Data w/ an opinion Trends Technical SF Proto Vision for 2026 Future we want Future we want to avoid Social Uncertainty is the land of innovation Vision 2016 2026 Gate 2019 Flag 2023

Threatcasting Process Data w/ an opinion Trends Technical SF Proto Vision for 2026 Future we want Future we want to avoid Social Uncertainty is the land of innovation Vision 2016 2026 Disrupt Event Mitigate Recover

ACI Threatcasting 8/16/16 and 8/17/16

Agenda: Day One 8:00 am to 9:00am: Gather and Breakfast 9:00 am to 9:15am: Kick Off 9:15 am to 9:30am: Agenda Review and Threatcasting Overview (BDJ) 9:30am to 10:30am: Research Inputs Round 1 Groups and Exercise Explanation Slot 1: (15min) Steven L. Neuberg, PhD, Lab Director and Principal Investigator Slot 2: (15min) Brian David Johnson “The Rise of Sentient Machines” Slot 3: (15min) Fernando Maymi “10 years from Now – ACI Perspective” 10:30am to 11:00am: Break

Agenda: Day One 11:00am to 12:00pm: Research Inputs Round 2 Slot 4: (15min) Jamie Winterton- Director, Strategy in the Global Security Initiative “Competitive analysis of university cyber security centers” Slot 5: (15min) Sharon Rice Strategist – APICS “The Weakest Link - Cyber Threats and the Future of the Global Supply Chain” Slot 6: (15min) Aaron Brantly #Tech4Terror and the Future of Jihad Slot 7: (15min) CyberSecurity Futures 2020 12:00am to 1:30pm Lunch and Research Synthesis Exercise (Break in Groups Work with Synthesis Worksheet) 1:30pm to 2:30pm Research Synthesis Exercise Report Out

Agenda: Day One 2:30pm to 4:00pm Threatcasting Exercise Directional Chat w/ Chris Claremont (Break into Groups Work with Threatcasting Worksheet) 4:00pm to 4:10pm Break 4:10pm to 4:45pm Threatcasting Exercise Report Out 4:45pm to 5:00pm Wrap up and Next Steps

Agenda: Day Two 8:00 am to 9:00am: Gather and Breakfast (NOTE: BDJ to join at 9am) 9:00 am to 9:15am: Kick Off (ACI) 9:15 am to 9:30am: Agenda Review, Review Previous Day and Threatcasting Exercise (BDJ) 9:30am to 10:30am: Threatcasting Exercise (Break into Groups Work with Threatcasting Worksheet) 10:30am to 10:45am: Break 10:45am to 11:30am: Groups Finalize Threatcasting Worksheet 11:30am to 12:00pm: Threatcasting Report Out General Threatcasting Session Ends

Agenda: Day Two 12:00am to 1:00pm Lunch Core Team Gathers 1:00pm to 2:00pm Review Event and Clustering Discussion 2:00pm to 3:00pm Backcasting Exercise: Gates and Flags (Break into Groups Work with Threatcasting Backcast Worksheet ) 3:00pm to 3:15pm Break 3:14pm to 4:00pm Report Out 4:00pm to 4:30pm Rapid Exercise: Stand For / Stand Against 4:30pm – END Wrap up and Next Steps

Curated Inputs = Specific Focus Artificial Intelligence Complex Automated Systems Supply Chain Disruptions Terrorist and Technology

Actors Vandals Hacktivists Criminals Criminals (State Sponsored) Terrorists Terrorists (State Sponsored) Terrorists / Hacktivists State Actors Corporate Espionage / Destabilization

Frameworks: A Note In threatcasting, frameworks are used to gather together and organize for use the large amount of data we produce. They provide us a way to dig even deeper and process new information. They are the tools used to measure, evaluate and take action.

Framework: A Widening Attack Plain Blended Attacks Uncertainty is the land of innovation Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain Traditional Warfare / Blended Cyber Warfare Blended Attacks Uncertainty is the land of innovation Go Dark / Brown Out / Supply Chain / Automated Systems Influence / Destabilize / Attack / Micro-targeting Criminal / Hack & Release / Espionage Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain Blended Attacks Uncertainty is the land of innovation Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain (Day 1) Seven Five Three Blended Attacks Uncertainty is the land of innovation Four Six Two One Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain (Day 2) Nine Thirteen Eight Blended Attacks Uncertainty is the land of innovation Seven Ten Fourteen Twelve Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain (Combined) Nine Thirteen Eight Ten Seven Five Seven Twelve Blended Attacks Uncertainty is the land of innovation Fourteen Three Two Six Four One Data/Digital Social Physical Kinetic

Preliminary 10+ year Threats Vulnerabilities of Complex Automated Systems Efficiency is easy to hack Weaponization of Data Data + Social Destabilization of trust Offense against algorithms and Complex Automated Systems Weaponization of A.I. Weapon vs Watching the plain Physical Vulnerabilities (Global Supply Chain) Weak links at the fringes Defense & Industry

Preliminary 4-8 year Milestones “Go Dark” Plans Cyber Amber Alerts New Norms and New Roles Identify Critical Economic and Security Efficiency is Easy to Hack Redefine Human interaction in complex automated systems Broader Public/Industry/Academia Conversation

Next Steps Final Report Out – CyCon U.S. - October 21-23rd 2016 Article Series Industry Report Outs Academic Collaboration 2017 Cyber Threatcasting

Back Up

Framework: A Widening Attack Plain Blended Attacks Uncertainty is the land of innovation Data/Digital Social Physical Kinetic

Framework: A Widening Attack Plain Blended Attacks Uncertainty is the land of innovation Data/Digital Social Physical Kinetic