The Future of Cyber Security

Slides:



Advertisements
Similar presentations
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Advertisements

A Comprehensive Study for RFID Malwares on Mobile Devices TBD.
Cyber Security Quiz By: Alex Alberg. Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Formulating a Security Policy for the Modern IT Landscape.
The value of a functioning M&E System for Military Procurement: South Africa as a case study Gwendolyn Wellmann, PhD Research Associate Nelson Mandela.
Lessons Learned in Smart Grid Cyber Security
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.

Activity 2 Practice.
Desktop Security: Making Sure Your Office Environment is Secure.
What does i2 equal? 1 -1 i Don’t know.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Information Management System Ali Saeed Khan 29 th April, 2016.
Database Security Carl J. Hoppe 20 November 2013.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Bitdefender Antivirus Total Protection Tech Support number
ACC 291 Week 3 Individual WileyPLUS Practice Ch 12 Question 1 Which of the following is not a primary reason why corporations invest in debt and equity.
Is Endpoint security dead?
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Welcome CCERP 2016
What is Happening in Washington?
Hotspot Shield Protect Your Online Identity
ICT for Masses New Environment Opportunities and Threats
Securing the Academy: Better Cybersecurity for Instructors and Administrators
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Welcome.
Introduction to Computer Security
Securing the Law Firm Myth vs. Reality vs. Practicality:
What is EGDPR?.
Dr Paul Lewis Chief Technology Officer
My First Template.
CSI Survey 2007 Tiffany Gorman
Today’s Risk. Today’s Solutions. Cyber security and
Call AVG Antivirus Support | Fix Your PC
Clemson University: Jill Gemmill
دانشگاه شهیدرجایی تهران
FAIR 2018 – Cyber Risks & Markets
BECOMING AN ANALYICAL POLITICAL THINKER
تعهدات مشتری در کنوانسیون بیع بین المللی
By Kimberly Chiffens and Jeff Marino
بسمه تعالی کارگاه ارزشیابی پیشرفت تحصیلی
دومین کمیته مترجمین حاکمیت بالینی دانشگاه
Assistant Vice President and Chief Technology Officer
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Cyber Security Challenges
Cyber Risk & Cyber Security
Mrs. Loi a. Law Faculty B1 If I move house in the next two years …
What is EUGDPR?.
PROTECT Meeting #34 Paris
4.5.2 Human sexuality and the idea of sexual rights
World-Leading Research with Real-World Impact!
CYBER RISKS IN SECURITIES SERVICES
Figuring out CyberSecurity Return On Investment
Presentation transcript:

The Future of Cyber Security Eugene H. Spafford Purdue University CERIAS

My Presentation I’m not using PowerPoint for this presentation Lots of reasons, but for one of the better presentations why, see http://www.norvig.com/Gettysburg/

Questions

Audience Response System Please pick up your keypad.

Open vs. proprietary: Which is inherently more secure? Open source Proprietary source Neither 0/0

Computer malware: Pretty much every kind of computer system is equally vulnerable to computer viruses. True False 0/0

Is your security posture… Better than 3 years ago Worse than 3 years ago About the same as 3 years ago (Include the level of threat, the level of protection in place, and the value of assets) 0/0

Which worries you most? Increasing complexity of systems Increasing use of portable computing Increasing globalization Increasingly restrictive IP laws All of the above None of the above 0/0

Thinking of the Future How much money do you think the Federal Government is investing in basic cybersecurity research? $50 million per year $250 million per year $600 million per year $1.5 billion per year

Which worries you most? Increasing complexity of systems Increasing use of portable computing Increasing globalization Increasingly restrictive IP laws All of the above None of the above 0/0

Which will be most important in the next few years? Auditability Privacy Patch management Usability Forensics 0/0

Conclusion Thank you for your attention and your participation For more information on what the 60+ faculty at CERIAS are up to, see: http://www.cerias.purdue.edu

Mr. Spafford will be available for questions before lunch.