Upload
lengoc
View
214
Download
0
Embed Size (px)
Citation preview
2
Agenda
• Same Threat – New Avenue
• The Difficulty in Drone Detection
• 1. Threat Variance
• Focus: Cyber Security
• 2. Lack of Standardization
• 3. Every site in vulnerable
• Addressing the Threat
• Dedrone
3
1
Physical & IT Security Strategies Have a Gaping Hole
• Every enterprise and every individual protected by a traditional fence now
requires an aerial equivalent.
4
2017 & Beyond: Explosive Drone Industry Growth
• Millions of drones already in the air
• Growing at over 30% year-over-year
• FAA forecasts 7 million drones by 2020
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
3,000,000
3,500,000
4,000,000
2013 2014 2015 2016 2017
Drone Units Sold
5
Hacker Drone
CYBER
Surveillance Drone
PHYSICAL / CYBER
Terrorist Drone
PHYSICAL
Smugglers Drone
PHYSICAL / CYBER
Challenge 1: Threat Variance
6
Threat: Hacking Drone
Payload• Sniffing device
• Spoofing device
• Raspberry Pi
Threat• Hacking, data extraction
Examples• Data center snooping
• WiFi spoofing
• Internet-of-Things hacking
9
Working on a secured floor in a 30-story office tower used to put your confidential
documents out of reach of Wi-Fi hackers. Not any more. Closing the physical gap with
a drone dramatically simplifies an attack or scan of vulnerable devices.
Next Generation of Hacking
1 0
Challenge 2: No Design StandardsRC
2.4 GHz
WiFi, RC
2.4 GHz
RC
5.8 GHz
Lightbridge 1,
RC 2.4 GHzLightbridge 2 Ocusync
2012
2013
2014
2015
2016
2017
Phantom 1
Phantom 2Phantom 2
Vision
Inspire 1
Phantom 3
Phantom 3
Adv/Pro Phantom 4
Pro
Mavic Pro
Spark
1 1
Challenge 3: Every Site is Vulnerable to Drone Attacks
Prisons Stadiums
Datacenters
Events
Private ResidencesCorporations
1 3
High-Growth Company Background
• Founded in 2014, with HQ in San Francisco and offices in Washington, D.C. and in Kassel, Germany
• Founders with extensive experience building technology companies
• Backed by $28M in funding from top-tier investors such as Menlo Ventures, FelicisVentures, and John Chambers
Leaders in Airspace Security
• Sensor agnostic, software centric platform
• Solution deployed at datacenters, stadiums, correctional facilities, and companies of all sizes. (200+)
About Dedrone
1 6
Active Mitigation
Additional Security Layers
Passive Mitigation
Foundational System
Threat Analysis
Lower Airspace Security Strategy
Minimum investment to
evaluate threat in specific
environment
Detect, Classify, real-time location of
drone and base station
Based off situational awareness implement
SOPs, take automated steps to protect assets
Create redundancy in detection and drone
localization, detect non-conventional drones
Fully understand threat to select the appropriate
active mitigation technology