Cyber strategy brief - storage.googleapis.comThe Stonesoft Mission “to protect and save lives and...
Transcript of Cyber strategy brief - storage.googleapis.comThe Stonesoft Mission “to protect and save lives and...
Cyber strategy brief Balance of risks and opportunities
These are computers in the internet
This is a computer in the Internet
This is a “fly-by-wire” piece of equipment
THE DIGITAL WORLD OF BITS. IN OUR SOCIETY THE DIGITAL AND
PHYSICAL ARE INTEGRATED.
“cyber”
MI6 recrui*ng example
MI6 quote
“The future of America’s security is
in this room” General Keith Alexander in Defcon
“…cyber security ranks alongside
terrorism”
Recruiting 500k ‘Cyber warriors” in the next 5 years
MI5 chief Jonathan Evans Indian Government in 2012
Cyberwar in action: israel gaza conflict
“In the past four days, Israel had ” deflected 44 million cyber attacks on government websites” - Finance minister Steinitz during the Gaza conflict in 2012
Cyber Crime has become an Industry worth more than drug traficking ($400+ bn/year)
Equal to corruption or accounting frauds...
…costing on average $5.9 million/year for every
corporation
1. Our dependency and vulnerability of world of bits
Why cyber security is now a hot topic?
2. State actors and resources
3. Threat and remedy arms race
4. Cost effectiviness and ease of use
WHAT IS SECURITY? Reality How things really are? Feeling Are we safe? Model How do we protect ourselves? - technologies - competences - processes
“007, I can do more damage on my laptop, sitting in my pajamas, before my first cup of Earl Grey
than you can do a year in the field.” -Q
Reality has changed
No geographical distances
• Proximity does not ma9er
Deterrence not based on material power
• Competence ma9ers • Assessment difficult
Li9le reac.on .me for defense
• No early warning
A2ribu.on problems • Escala*on risk from
responses
Reality has changed
THE DYNAMIC THREAT LANDSCAPE
Military/political influence
Political change
Intellectual property gain
Financial gain
Ego, curiosity and change
Military/political dominance
Advanced states
Terrorist networks and groups
Nation-states and enterprises
Criminals
Hacker groups and individuals
Advanced cyber-nation- states
Critical infra, military and political assets
Infrastructure, assets and public places
Governments, companies and individuals
Companies and individuals
Governments, companies and individuals
Critical infra, military and political assets
Motivation Actors Target
TACTICAL CYBER WAR
TERRORISM
ESPIONAGE
ORGANIZED CRIME
VANDALISM, HACKTIVISM
STRATEGIC CYBER WAR
3. Cyber world is a great opportunity
Why to take this seriously
2. Threats are real and current
1. The most important factor to change our security thinking
Strategic level
Operative level
Technology level
Problem of disconnect
Strategic level
Operative level
Capability level
GU
IDA
NC
E
Next step: balanced cyber strategy
Step 1. STRATEGIC LEVEL
Contents: • Cyber exposure
• Importance for future
• Opportunities & threats
Step 2. OPERATIVE LEVEL
Contents: • Enablement plan • Security plan …for important example cyber issues
Step 3. CAPABILITY LEVEL
Contents: • First capability needs
identified for Enablement and Risk plans
1. Change the way of thinking
2. Real time situational awareness
3. Centralised control
4. Dynamic thinking and solutions
5. Preparedness for unknown threats
6. Resilience
7. Optimize resource usage
Typical outcomes of cyber strategy workshops
“We believe the most exciting
developments in cyberspace
are still to come…”
The Stonesoft Mission
“to protect and save lives and
businesses in cyber space”
Network security from Stonesoft
Datacenters and cloud Mission critical networks Classified data and IPR
Financial transactions & assets
Business continuity & applications
Multi-location businesses & services
Committed to protecting customers’
Cyber strategy brief Balance of risks and opportunities
Cyber strategy brief Balance of risks and opportunities