What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009.

Slides:



Advertisements
Similar presentations
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
Advertisements

“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
© 2006 IBM Corporation Privacy Matters: Safeguarding Identity, Data and Corporate Reputation Harriet P. Pearson VP Corporate Affairs & Chief Privacy Officer.
The future of technology, law enforcement, and justice ICJIA Feburary, 2013.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
“Artistic creativity is a whirlpool of imagination that swirls in the depths of the mind.” Robert Toth.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.
Tefko Saracevic, Rutgers University1 Libraries, library services & library public Historical perspective & evolutionary trends.
MD 815 Session #3 Technology Forecasting & Scenario Planning 1. Introduction 2. S-Curves and quantitative forecasting 3. Scenario Planning.
© 2007 IBM Corporation © 2009 IBM Corporation 1 Tran Viet Huan, PhD CTO, IBM Vietnam IBM Research Global Technology Outlook.
Corporate Entrepreneurship II MBAX 6100 Entrepreneurship & Small Business Management Frank Moyes Leeds College of Business University of Colorado Boulder,
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Emerging Information Systems Chapter 8. Competitive Advantage in Being at the Cutting Edge To achieve competitive advantage –Differentiate your products.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Learning in the workplace 2020 Clive Shepherd
Lessons Learned in Smart Grid Cyber Security
“Mitigating Offshoring Risks in a Global Business Environment“
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Kim Andreasson Managing Director DAKA advisory AB Bahrain International eGovernment Forum Kingdom of Bahrain 8-10 April 2013 Measuring E-Government.
Copyright Shikhar Sarin 2011 Pre-Market Forecasting of Innovations (HDTV Case) - Preview EMBA 512 – Assessing Business Opportunities Professor Shikhar.
An Environmental Scan for Data Services Trends that are shaping today’s environment for data services.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
New Products Management
2010 Ministry of Economic Development of Georgia Communications and IT Department Overview of the Georgian ICT Sphere and its Future Development Irakli.
What if? Virtual Time Line- PBL (Remember a time line goes in the order that it happened)
Time travel is thought to be impossible but take a look at these quotes: "Heavier-than-air flying machines are impossible." (Lord Kelvin, president, Royal.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
InfoSecurity and Outsourcing 17 March 2009 Colin Dixon Head of Risk and Compliance.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
The International Dimension, Part IV International IT Development and Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Information Warfare Playgrounds to Battlegrounds.
Country case study: The Netherlands The views expressed in this paper are those of the authors and do not necessarily reflect the opinions of the ITU,
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
1 Lessons of Steve Jobs. 2 Steve Jobs “Experts” are clueless 1.1.
Highlights on the New ICT Strategy After the 25 th January Revolution Dr. Mohamed Salem Minister of Communications and Information Technology October 2011.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
MD 815 Session #3 Technology Forecasting 1. Introduction 2. Quantitative forecasting techniques 3. Predicting Diffusion Case.
Why should you study information systems? How can an individual make better use information technology? How does an organization use information systems?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Famously Wrong Predictions. "Drill for oil? You mean drill into the ground to try and find oil? You're crazy.“ -- Drillers who Edwin L. Drake tried to.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
THE CURRENT GLOBAL ICT ENVIRONMENT
Cybersecurity, competence and preparedness
Cybersecurity - What’s Next? June 2017
Careers in Cyber Security
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
The Cyber Threats Landscape
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Examples of Analytics in Higher Education
Securing the Threats of Tomorrow, Today.
Emerging technologies
National Information Assurance (NIA) Policy
This “telephone” has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us. Western.
Presentation transcript:

What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009

Horizon 2011 Copyright © 2009 Information Security Forum Limited 2 Agenda Introduction The challenge The process The threats in 2011 Beyond 2011 What do I do now?

Horizon 2011 Copyright © 2009 Information Security Forum Limited 3 The Information Security Forum And much more besides!

Horizon 2011 Copyright © 2009 Information Security Forum Limited 4 Our challenge.... How do we make sure we don’t cry wolf?

Horizon 2011 Copyright © 2009 Information Security Forum Limited 5 Is to predict the future… “Heavier-than-air flying machines are impossible” Lord Kelvin, president, Royal Society 1895 “I think there is a world market for maybe five computers” Thomas Watson, chairman of IBM 1943 “I have travelled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won't last out the year.” The editor in charge of business books for Prentice Hall 1957 “This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us.” Western Union internal memo 1876 Increasingly, information technology is playing a pivotal role in all our lives, both at work and at home

Horizon 2011 Copyright © 2009 Information Security Forum Limited 6 What is the threat horizon? A report that... identifies new and changing threats that are likely to impact information security over the next 24 months is written for both information security and business audiences informs information security strategy.

Horizon 2011 Copyright © 2009 Information Security Forum Limited 7 Threat horizon methodology POLITICAL LEGAL ECONOMIC SOCIO-CULTURAL TECHNICAL Consider the world of the future and how this may give rise to information security threats

Horizon 2011 Copyright © 2009 Information Security Forum Limited 8 2 x Half day workshops Security professionals from across the globe World Congress Threat Horizon Dataset Regional meetings Sector Input Ongoing ISF research and analysis Specialist ISF Members Specialist ISF Members Specialist ISF Members ISF Analysis Threat Horizon 2011 The process… Expert Input World Economic Forum Menlo Park (PwC) Supranational bodies (OECD, WEF etc.) Futurologists

Horizon 2011 Copyright © 2009 Information Security Forum Limited predictions for Instability EnergyTerrorism PoliticalLegal Discovery Compliance Record Mgt Economic Organised crime Extreme Weather E-economy Technical New products Digital convergence Device convergence Home vs. work Remote Working Gen Y Socio-cultural

Horizon 2011 Copyright © 2009 Information Security Forum Limited for 2010… What changed? 2010 Cyber- terrorism Lack of trust Terrorism PoliticalLegal Electronic evidence Intellectual property ID theft Economic Organised crime Complex ownership Emerging economies Technical Solar flares Process control Web 2.0 Demo- graphics Corporate loyalty Socio-cultural Terrorism and organised crime are the only two threats to stay on the list

Horizon 2011 Copyright © 2009 Information Security Forum Limited 11 What will world look like in 2011?

Horizon 2011 Copyright © 2009 Information Security Forum Limited 12 Information security threats for 2011…. Criminal attacks Weaknesses in infrastructure Tougher regulatory legislation Pressures on offshoring / outsourcing Eroding network boundaries Mobile malware Vulnerabilities of Web 2.0 Incidents of espionage Insecure coding and development practices Changing cultures

Horizon 2011 Copyright © 2009 Information Security Forum Limited 13 Criminal attacks Crimeware as a service Insider attacks Infiltration Tougher rules Emphasis on privacy Incompatible laws Increasing punishment Outsourcing / Offshoring More outsourcing Meeting compliance Instability of providers Weak infrastructure Reduced investment Complexity Zero-day attacks Eroding boundaries Cloud computing More connections Bypass of defences Top five threats in detail

Beyond

Horizon 2011 Copyright © 2009 Information Security Forum Limited 15 Beyond the horizon Quantum computing Nano technology New computing interfaces AI Everyone connected to everything Biometrics Embedded chips SPIT

Horizon 2011 Copyright © 2009 Information Security Forum Limited 16 What do I do now? Re-assess the risks to your organisation and its information Inside and outside… Change your thinking about threats Don’t rely on trends or historical data Revise your information security arrangements Question ‘security as usual’ Focus on the basics That includes people, not just technology! Prepare for the future Be ready to support initiatives such as cloud computing

Information Security Forum