Transcript
Page 1: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/2018

1

ROB CLYDECISM, NACD BOARD LEADERSHIP FELLOWMANAGING DIRECTOR, CLYDE CONSULTING LLCVICE-CHAIR, ISACAEXECUTIVE CHAIR WHITE CLOUD SECURITYEXECUTIVE ADVISOR TO BULLGUARD AND HYTRUST

Page 2: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

THE FUTURE:DIGITAL BY DEFAULT

11/30/20182

Page 3: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

NEW MANUFACTURING COMPANIESARE REALLY SOFTWARE COMPANIES

11/30/20183

E L O N M U S KT E S L A C E O

“Tesla is a software company as much as it is a hardware company”

Page 4: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

OLD MANUFACTURING COMPANIESARE SOFTWARE COMPANIES TOO?

Software is a core skill for General Motors

11/30/20184

M A R A B A R R AG e n e r a l M o t o r s , C E O

Page 5: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

digital business with software at the core

11/30/20185

Page 6: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

DIGITAL OUTAGES LIKE THOSE AT THE AIRLINES AND NEW YORK STOCK EXCHANGE ARE THE NEW NATURAL DISASTERS

Failures Like the Delta Outage Are a Fact of Digital Business

11/30/2018 ® 2018 ISACA. All Rights Reserved.6 Source: http://blogs.wsj.com/cio/2016/08/09/failures-like-the-delta-outage-are-a-fact-of-digital-business/

Network Outages Like NYSE, United Airlines are the New Natural Disasters

British Airways Computer Glitch Causes Big Delay at Multiple Airports

Page 7: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

EQUIFAX VIDEO

11/30/2018 ® 2018 ISACA. All Rights Reserved.7

Page 8: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

INVESTMENT AND ATTENTION IMPROVING

11/30/2018 ® 2018 ISACA. All Rights Reserved.8 Source: ISACA’s State of Cybersecurity 2018

Page 9: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

2018 STATE OF CYBERSECURITY: THREAT LANDSCAPE

Page 10: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

RANSOMS GETTING MORE EXPENSIVE

11/30/201810

Ransomware got a proverbial shot in the arm earlier this year following the WannaCry attacks and it looks as if hackers are getting more brazen with their requests as a result.

Web hosting company Nayana, based in South Korea, was attacked with the Erebus ransomware on June 10. The company ultimately had to pay a fee of 397.6 Bitcoin (approximately $1 million), the largest ransomware paid ever.

Published June 21, 2017

Erebus ransomware targets vulnerable Linux serversSome Nayana servers were running 2008 versions

Ransomware attack costs South Korean company $1M, largest payment ever

Page 11: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

SAN FRANCISCO TRANSPORTATION HIT WITH RANSOMWARE

11/30/2018 ® 2018 ISACA. All Rights Reserved.11

CITY LETS PEOPLE RIDE FOR FREE UNTIL ISSUE RESOLVED

Ransomware Crooks Demand $70,000 After Hacking San Francisco Transport System

Page 12: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

RANSOMWARE OPERATORS ADOPT TYPICAL BUSINESS PRACTICES

11/30/201812

TECHNICAL SUPPORT TIME LIMITED OFFERS TRY BEFORE YOU BUY

Page 13: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

APP CONTROL RECOMMENDED AS #1 MITIGATION STRATEGY

THE AUSTRALIAN GOVERNMENT issued mandatory application whitelisting usage requirements to protect their “high value” systems

11/30/2018 ® 2018 ISACA. All Rights Reserved.13

RUN ONLY KNOWN TRUSTED APPS

Page 14: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

SOON EVERYTHING WILL BE CONNECTED

11/30/2018 ® 2018 ISACA. All Rights Reserved.14 Source: https://schrier.wordpress.com/2015/05/25/the-internet-of-first-responder-things-iofrt/

OFFICE SUPPLIES SURVEILLENCE

COOKING IMPLEMENTS

UTILITIES

HOME APPLIANCES

Page 15: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/2018 ® 2018 ISACA. All Rights Reserved.15

Page 16: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/201816

CONNECTED DEVICES ON PUBLIC INTERNET

Source: SHODAN

Page 17: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

”SMART” DEVICES ARE VULNERABLE

11/30/2018 ® 2018 ISACA. All Rights Reserved.17

Hackers Infect Army of Cameras, DVRs for Massive Internet AttacksHacking shows vulnerability of internet devices, security experts say.

Attackers used an army of hijacking security cameras and video records to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of ”smart” devices in homes and business connected to the internet.

Page 18: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

USING THE INTERNET OF THINGS TO SPY?

11/30/2018 ® 2018 ISACA. All Rights Reserved.18 Photograph Source: Alex Brandon/AP

US Intelligence Chief: We Might Use the Internet of Things to Spy On You

“In the future, intelligence services might use the internet of things for identification, surveillance, monitoring, location tracking and targeting for recruitment”, says James Clapper, US director of national intelligence.

Page 19: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

INTERNET-CONNECTED SURVEILLANCE?

11/30/2018 ® 2018 ISACA. All Rights Reserved.19

Source: https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

WikiLeaks released thousands of documents that it said described sophisticated software tools used by the Central Intelligence Agency to break into smartphones, computer and even internet-connected televisions.

If the documents are authentic, as appeared likely at first review, the release would be the latest coup for the anti-secrecy organization and a serious blow to the C.I.A.

Page 20: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

INTERNET-CONNECTED SURVEILLANCE?

11/30/2018 ® 2018 ISACA. All Rights Reserved.20

https://www.wsj.com/article_email/chinas-tech-giants-have-a-second-job-helping-the-government-see-everything-1512056284-lMyQjAxMTI3MzA2MTIwNjE0Wj/?mg=prod/accounts-wsj

China’s Tech Giants Have a Second Job: Helping Beijing Spy on Its People

Tencent and Alibaba are among the firms that assist authorities in hunting down criminal suspects, silencing dissent and creating surveillance cities

Page 21: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

SMART THERMOSTAT VULNERABILITY

11/30/2018 ® 2018 ISACA. All Rights Reserved.21

Industrial monolith sold hackable thermostats, says expert

Thermostat program could give a potential robber times when the home may be empty.

Malicious attack could be launched by raising temperatures too high or low. Winter-time damage could include freezing, burst water pipes.

Page 22: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

CONNECTED CARS ALSO AT RISK

11/30/2018 ® 2018 ISACA. All Rights Reserved.22

Researchers Remotely Hack Tesla Model S While it’s Being Driven

The remote hacks likely work on all Tesla models, but on the parked Model S P85, the researchers remotely opened the sunroof, turned on the turn signal, and changed the position of the driver’s seat.

Researchers also hacked a 75D model while it was moving, controlling the brakes from 12 miles away.

Page 23: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

IOTSCANNER.BULLGUARD.COM

11/30/201823

UNIQUE SCANS PER WEEK100K+

OF SCANS HAVE VULNERABILITIES5%

Page 24: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

IOT – RECOMMENDATIONS FOR ORGANIZATIONS

Safely embrace Internet of Things devices in the workplace to keep competitive advantage

Require wireless IoT devices be connected through the workplace guest network or other isolated segment, rather than internal network

Ensure all workplace devices owned by organization are updated quickly whensecurity upgrades are released

11/30/2018 ® 2018 ISACA. All Rights Reserved.24

Scan networks for IoT devices; monitor for and block dangerous traffic to or from IoT devices

Ensure default passwords are changed and strong

Provide cybersecurity training for all employees to demonstrate their awareness of best practices of cybersecurity and the different types of cyberattacks

Ensure that IT and security professionals areISACA certified

Page 25: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

AUGMENTED REALITY DISRUPTING THE WAY WE SEE THE WORLD

11/30/2018 ® 2018 ISACA. All Rights Reserved.25

OPENING UP NEW WAYS OF ATTRACTING CUSTOMERS AND DOING BUSINESS

P O K É M O N G O L AYA R C O C A - C O L A

Page 26: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

BUT THERE IS A DARK SIDE TO AUGMENTED REALITY

11/30/2018 ® 2018 ISACA. All Rights Reserved.26

ASSOCIATES SOCIAL MEDIA INFORMATION

WITH LOCATIONCRIMINALS USE

AUGMENTED REALITYTO LURE VICTIMS

TO LOCATION

SHOWS POSTED, GEOTAGGED RACY IMAGES AND VIDEO

GANGS AND TERROR GROUPS VIRTUALLY

MARK TERRITORY AND TARGETS

DISTRACTED WALKING AND

DRIVING

Page 27: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

AUGMENTED REALITY OPPORTUNITY AND CHALLENGES

AR offers the potential ofpositive business impact in:

NEW BUSINESS MODELS/OFFERINGS

BETTER COLLABORATION

BETTER MARKETING

INCREASED EFFICIENCY

11/30/2018 ® 2018 ISACA. All Rights Reserved.27

Say organizations should be concerned about AR privacy risks

Source: ISACA Risk Reward Barometer – Nov. 2016

75%

64%

87%

Don’t have policy to address the use of AR apps in the workplace

Have a way to detect pictures, posts and videos geotagged to their business locations or advertisements

Page 28: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?
Page 29: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

EVEN GENE EDITING IS DIGITAL

11/30/2018 ® 2018 ISACA. All Rights Reserved.29

Chinese scientists use US-invented CRISPR/cas9 Gene editing tool in trials to cure cancer

Page 30: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/2018 ® 2018 ISACA. All Rights Reserved.30

Chinese Scientist Claims World’s First Genetically Modified Babies Scientific community expresses alarm, warning that experiments using nascent DNA-editing technology pose too many risks

Gene-editing tools such as Crispr-Cas9, which Dr. He said he used, are cheap, easy-to-use and powerful. . . .

Editing so-called germ cells—the genes of sperm, eggs and embryos—is even more controversial because any changes would pass on to future generations, giving a tiny blip potentially far-reaching consequences. . . .until Monday no one has been known to have implanted them into a woman’s womb.

Page 31: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

WHAT IS THE CYBER RISK FOR GENE EDITING TOOLSLIKE CRISPR/CAS9?

11/30/2018 ® 2018 ISACA. All Rights Reserved.31

Source: http://www.crisprtx.com/gene-editing/crispr-cas9

Page 32: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

Cloud enables the

11/30/201832 ® 2018 ISACA. All Rights Reserved.

DIGITALBUSINESS

Page 33: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

CLOUD – ALL YOU NEED IS AN IDEA AND A CREDIT CARD

One thing to play with it. Another thing to depend on it

11/30/201833

Reintroduce control without reintroducing friction

Page 34: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

PUBLIC CLOUD MARKET IS IN HYPER GROWTH

11/30/2018 ® 2018 ISACA. All Rights Reserved.34

2015

Source: Forrester, “The Public Cloud Services Market Will Grow Rapidly To $236 Billion in 2020”

$91B $236B

$157B

$64B

$15B

$75B

$12B$4B

CLOUD APPS (SAAS)

CLOUD BUSINESS SERVICES

CLOUD PLATFORMS (IAAS/PAAS)

CLOUD APPS (SAAS)

CLOUD BUSINESS SERVICES

CLOUD PLATFORMS (IAAS/PAAS)

2020

Page 35: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

WHAT LIMITS CLOUD ADOPTION?

What factors are limiting your adoption of virtual/private, community and public clouds today?

11/30/2018 ® 2018 ISACA. All Rights Reserved.35

• Encryption helps, but key management is critical

• Regulatory, sensitivity and privacy issues may require that some data is restricted to certain physical locations

• Restrict sensitive workloads (e.g., PCI) to trusted hardware and software server stack

• Only allow certain workloads to run on hardware in approved physical location

• Only allow certain workload data to be decrypted in approved physical location

• Cloud solutions require a combination of capabilities to achieve “defense in depth” and compliance readiness

Page 36: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

SECONDARY APPROVAL ADMINISTRATORS

CONSIDER ADDING SECONDARY APPROVAL CONTROLS

HYPERVISOR OR CLOUD CONTROL

ADD-ON

VIRTUAL INFRASTRUCTURE

ADMINISTRATOR

NOT APPROVED

DOES NOT NEED SECONDARY APPROVAL

DELETEVIRTUAL MACHINE

ADD STORAGE

11/30/2018 ® 2018 ISACA. All Rights Reserved.36

Page 37: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

BIG DATA AND ANALYTICS APPLICATIONS

10011/30/2018 ® 2018 ISACA. All Rights Reserved.37

PREDICTING CONSUMER BEHAVIOR

CURING CANCER PREDICTING WEATHER

REDUCING ENERGY COSTS

BUILD BETTER CARS

SERCURITY INTELLIGENCE AND FRAUD DETECTION

ZETTABYTES BY 2025!

Page 38: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

What about predicting crime by particular individuals? Will we have predictive capabilities LIKE THOSE IN THE MOVIE MINORITY REPORT, BUT THROUGH BIG DATA?

11/30/201838 ® 2018 ISACA. All Rights Reserved.

Page 39: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

USING BIG DATA TO PREDICT CRIME

11/30/2018 ® 2018 ISACA. All Rights Reserved.39 Source: NetworkWorld, Sep 20, 2014

A “predictive policing” trial in California was able to identify areas where crime will occur three times more accurately than existing methods of forecasting

Page 40: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/2018 ® 2018 ISACA. All Rights Reserved.40

Page 41: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

ALPHAGO ZERO SURPASSES ALL PREVIOUS VERSIONS WITHOUT HUMAN INPUT

11/30/2018 ® 2018 ISACA. All Rights Reserved.41 Source: DeepMind

Page 42: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

DARPA CYBER GRAND CHALLENGEAT DEFCON

7 TEAMS

11/30/2018 ® 2018 ISACA. All Rights Reserved.42

competing with individual supercomputers with machine learning programs

ATTACKINGother systems and defending your own

“MAYHEM”took the top prize of $2M

Page 43: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/2018 ® 2018 ISACA. All Rights Reserved.43

IS THE FUTURE OF HACKING AI?

IS THE FUTURE OF CYBER DEFENSE AI?

??

https://www.cam.ac.uk/Malicious-AI-Report

Page 44: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

THE FUTURE:DIGITAL BY DEFAULTPRIVATE AND SAFE?

11/30/201844

Page 45: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

QUESTIONS?

11/30/201845

Page 46: CYBER FUTURE: SECURITY AND PRIVACY DOOMED?

11/30/201846

ROB CLYDECISM, NACD Board Leadership Fellow

Vice-Chair, ISACA International

Executive Chair, Board of Directors, White Cloud Security

Managing Director, Clyde Consulting LLC

Executive Advisor to Bullguard and Hytrust

[email protected]

E M A I [email protected]

W E B S I T Ewww.isaca.org


Recommended