SlideShare a Scribd company logo
1 of 140
Download to read offline
••
CyberVisionCyberVision:: 20202020 toto 20302030
YOURYOUR 2121ststCC CyberSecurityCyberSecurity ToolKitToolKit!!
1
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
YOURYOUR 2121ststCC CyberSecurityCyberSecurity ToolKitToolKit!!
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
••
ВидениеВидение кибербезопасностикибербезопасности:: 20202020--20302030
...21...21ststCC Комплект инструментовКомплект инструментов
длядля кибербезопасностикибербезопасности!...!...
2
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
длядля кибербезопасностикибербезопасности!...!...
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!”
Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!...
-- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI):
-- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes
-- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations
“Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30
ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!...
-- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
3
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
-- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...
“Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00
Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!...
-- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats
-- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning
-- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !...
“Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00
DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
6
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
7
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
8
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
-- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism”
-- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
2012 Representation of2012 Representation of
Possible Gearing for thePossible Gearing for the
AntikytheraAntikythera MechanismMechanism
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
9
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cyber YearCyber Year ZeroZero
Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
-- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
10
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
11
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR“YOUR CyberCyber Defence”Defence”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
12
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
““CyberCyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
““NeuralNeural Security”Security”
88–– 2121ststC National Cyber Strategy!C National Cyber Strategy!
““Cyber @ GovernmentCyber @ Government””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW“NEW CyberCyber Toolkit”Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR“OUR CyberCyber SocietySociety””
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR“YOUR CyberCyber Defence”Defence”
3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
13
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security”
44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence
““CyberCyber--Intelligent”Intelligent”
77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!.
““NeuralNeural Security”Security”
88–– 2121ststC National Cyber Strategy!C National Cyber Strategy!
““Cyber @ GovernmentCyber @ Government””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW“NEW CyberCyber Toolkit”Toolkit”
11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
14
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
15
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
16
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
“BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
17
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
“BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings
--“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 --
18
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!!
British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings
--“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 --
-- MagecartMagecart Java Script SkimmerJava Script Skimmer --
JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!!
19
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!!
JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!!
FullFull RiskIQRiskIQ Report:Report: www.riskiq.com/blog/labs/magecartwww.riskiq.com/blog/labs/magecart--britishbritish--airwaysairways--breach/breach/
Earlier “Data Breach”:Earlier “Data Breach”: 2211stst April to 28April to 28thth July 2018July 2018 –– 99 Days99 Days!!!.....!!!.....
Cathay Pacific:Cathay Pacific: Data Security BreachData Security Breach
..........9.4m9.4m CustomersCustomers “Hacked”:“Hacked”: 2424thth Oct 2018Oct 2018
20
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Personal Data:Personal Data: Passenger Name; Nationality; Date of Birth; #Phone; email;Passenger Name; Nationality; Date of Birth; #Phone; email;
Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........
Market Value:Market Value: 7%7% Share Price Loss :Share Price Loss : $361m$361m Market Cap Loss:Market Cap Loss: 9 Year Low9 Year Low......
AndroidAndroid Mobile MalwareMobile Malware:: ““GPlayedGPlayed””
-- Trojan AppTrojan App MimicsMimics “Google Play Store”“Google Play Store” --
21
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Discovered: 11th Oct 2018 – TALOS/CISCO
MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017
Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!...
22
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
*** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017
Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!...
23
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
*** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet
fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016
24
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such
asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!...
“Internet of Threats”!“Internet of Threats”!
Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017
25
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...)
....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
CyberSecurity:CyberSecurity: Market SectorsMarket Sectors
•• AntiAnti--Virus/FirewallVirus/Firewall
•• ID AuthenticationID Authentication
•• Encryption/PrivacyEncryption/Privacy
•• Risk & ComplianceRisk & Compliance
•• Mobile Device SecurityMobile Device Security
•• AI & Machine LearningAI & Machine Learning
•• Enterprise IoT SecurityEnterprise IoT Security
•• Cloud Security ServicesCloud Security Services
•• Big Data ProtectionBig Data Protection
•• RT Log/Event AnalyticsRT Log/Event Analytics
26
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Mobile Device SecurityMobile Device Security
•• AntiAnti--Fraud MonitoringFraud Monitoring
•• Website ProtectionWebsite Protection
•• S/W Code VerificationS/W Code Verification
•• RT Log/Event AnalyticsRT Log/Event Analytics
•• RealReal--Time Threat MapsTime Threat Maps
•• Smart BiometricsSmart Biometrics
•• Training & CertificationTraining & Certification
Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services...
....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats
“Y“YOUR CyberOUR Cyber Defence”Defence”
3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
22 –– TOP 10TOP 10 CyberCyber Attacks & Threats!Attacks & Threats!
“Y“YOUROUR CyberCyber Defence”Defence”
27
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststC National Cyber Strategy!C National Cyber Strategy!
“Cyber“Cyber @ Government@ Government””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
ThrustSSC – 1st Supersonic Car – October 1997
“Y“YOUROUR CyberCyber Defence”Defence”
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
28
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
BloodHoundBloodHound SSC 2017SSC 2017
””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!”
29
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
1997 Thrust SSC1997 Thrust SSC
Mach ONEMach ONE
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220M Yrs220M Yrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
30
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• 20032003-- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!...
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
•• 14401440 -- 11stst Printing Press...Printing Press...
•• 17901790 -- Industrial RevolutionIndustrial Revolution
•• 19431943 -- 11stst Neural NetworksNeural Networks
•• 19901990 -- “World“World--WideWide--Web”Web”
•• 590MYrs590MYrs -- AnimalsAnimals
•• 220M Yrs220M Yrs -- MammalsMammals
•• 75MYrs75MYrs -- PrimatesPrimates
•• 28MYrs28MYrs –– Lesser ApesLesser Apes
......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster
thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!...
Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence”
31
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• 20032003-- Social Media/SearchSocial Media/Search
•• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT”
•• 20162016 -- AI/ML Explosion !...AI/ML Explosion !...
•• 15MYrs15MYrs –– Great ApesGreat Apes
•• 8MYrs8MYrs –– PrePre--HumansHumans
•• 2MYrs2MYrs –– 11stst HumansHumans
...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at
~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!...
Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20182018 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
32
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
Transition fromTransition from “Cyber Now“Cyber Now -- 20182018””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20182018 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
33
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Global Market forGlobal Market for “Zero“Zero--Day”Day” Exploits!Exploits!
34
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Companies such as DCCompanies such as DC--basedbased Zerodium.comZerodium.com payout for “Zeropayout for “Zero--Day” exploits!Day” exploits!
Global Market forGlobal Market for “Zero“Zero--Day”Day” Exploits!Exploits!
.....Such.....Such “Zero“Zero--Day”Day” attack risks may be mitigatedattack risks may be mitigated
with newly developed “with newly developed “Cybersecurity Defences”Cybersecurity Defences”
35
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Companies such as DCCompanies such as DC--basedbased Zerodium.comZerodium.com payout for “Zeropayout for “Zero--Day” exploits!Day” exploits!
with newly developed “with newly developed “Cybersecurity Defences”Cybersecurity Defences”
UsingUsing Artificial Intelligence & Machine LearningArtificial Intelligence & Machine Learning!!
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
36
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
37
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
38
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
39
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
40
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
41
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
“Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
42
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!...
...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812
43
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns!
21stC21stC Cyber WarCyber War && Peace!Peace!
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber Defence”Defence”
33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security“Integrated Security””
44
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @“Cyber @ GovernmentGovernment””
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
Ship: SS Kinsembo – Liverpool to Congo - 1885
“Integrated Security“Integrated Security””
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
45
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert
-- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA --
46
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
Big HornBig Horn
(2) Rock Creek to Big Horn:(2) Rock Creek to Big Horn: Overland Stage CoachOverland Stage Coach
47
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1919thth C RoadC Road--MapMap –– Rev Herbert E. ProbertRev Herbert E. Probert –– Cheyenne City to Big Horn, WyomingCheyenne City to Big Horn, Wyoming –– 18841884
Cheyenne CityCheyenne City
Rock CreekRock Creek
(1) Cheyenne City to Rock Creek:(1) Cheyenne City to Rock Creek: Union Pacific RailroadUnion Pacific Railroad
1919ththCC “Missionary Explorer:“Missionary Explorer: Rev Herbert ProbertRev Herbert Probert
48
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Special Exhibition @Special Exhibition @ Museum of Fine Arts, Boston, USAMuseum of Fine Arts, Boston, USA
OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+
•• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged
“Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO”
•• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed
“Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things”
49
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to
“Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools
•• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity
based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated Security****** Integrated Security***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
50
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
51
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
52
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Dashboard!Dashboard!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
CSIM Example: “VIDSYS Inc - Enterprise 2018”
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber“YOUR Cyber DefenceDefence””
3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
53
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive Security”Adaptive Security”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Self“Self--Adaptive Security”Adaptive Security”
SelfSelf--Adaptive SecurityAdaptive Security in the Wild!...in the Wild!...
* Sociable Weaver Bird ** Sociable Weaver Bird *
“World’s Largest Bird Nests”“World’s Largest Bird Nests”
*** Southern Africa ****** Southern Africa ***
54
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
••Secure Living CommunitySecure Living Community
••SelfSelf--Organising ArchitectureOrganising Architecture
••Fully scalable for long term growthFully scalable for long term growth
••Supports 250+ Weaver BirdsSupports 250+ Weaver Birds
••RealReal--Time Disaster Alert SystemTime Disaster Alert System
••Sustainable in SemiSustainable in Semi--Desert SteppeDesert Steppe
••Robust against “Enemy Risks”Robust against “Enemy Risks”
such as Eagles, Vultures & Snakessuch as Eagles, Vultures & Snakes
...all the features of a 21...all the features of a 21ststCC--“Cyber Defence Centre“Cyber Defence Centre””––including Disaster Recovery & Business Continuity!.....including Disaster Recovery & Business Continuity!.....
Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT”
*** Self*** Self--Adaptive Security***Adaptive Security***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
55
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity
56
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
57
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
20182018 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
58
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
59
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
60
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies
•• BlockChainsBlockChains:: Distributed “Spreadsheets “ with
Encrypted Verification of “Financial Contracts”
– Apps in MOST Economic Sectors for Peer-to-Peer
On-Line Trading with NO Central Authority...
– Apps from Banks, Governments, & Retail Sectors
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
61
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include
BitCoin, Ethereum, LiteCoin, Ripple & Zcash
– Now more than 1000 Virtual CryptoCurrencies!....
– BitCoin is still most widely traded Virtual Currency
... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity
forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
Security Printing:Security Printing: Russian BondRussian Bond -- 19101910
62
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
Security Printing:Security Printing: Russian BondRussian Bond -- 19101910
63
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
Security Printing:Security Printing: Russian BondRussian Bond -- 19101910
64
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
Security Printing:Security Printing: Russian BondRussian Bond -- 19101910
65
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
New Russia Company Limited:New Russia Company Limited: ””ЮзовкаЮзовка””
66
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Steel Works :Steel Works : ЮзовкаЮзовка -- c1890c1890
““HughsovkaHughsovka”” --now “Donetsk”now “Donetsk”
Great GrandfatherGreat Grandfather : Edwin James WilliamsEdwin James Williams
19thC19thC “Troika Trip”“Troika Trip” NearNear ““HughesovkaHughesovka// ЮзовкаЮзовка””
with Great Grandfather (Edwin James Williams)with Great Grandfather (Edwin James Williams)
67
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference“Troika“Troika””–– Near Hughesovka (now Donetsk, Ukraine)Near Hughesovka (now Donetsk, Ukraine) –– c1890c1890 – www.Valentina.Net/ewww.Valentina.Net/e--archive.htmlarchive.html
Campus Net & Web Project Team:Campus Net & Web Project Team:
-- Donetsk Technical UniversityDonetsk Technical University -- 19961996
68
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Security Printing:Security Printing: Russian BondRussian Bond -- 19121912
69
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
Security Printing:Security Printing: Russian BondRussian Bond -- 19121912
70
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
Security Printing:Security Printing: Russian BondRussian Bond -- 19121912
71
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
Security Printing:Security Printing: Odessa BondOdessa Bond -- 19131913
72
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Financial SecurityFinancial Security Printing startedPrinting started MidMid--1919ththCC......
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
73
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security”
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning Security”Learning Security”
AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools
•• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s :
Neural Networks, Expert Systems, Self-Organising Automata,
Adaptive Stochastic Learning, Algorithms, Robotics,
Autonomous Systems, Augmented Reality
•• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time
modelling of ALL Network Traffic, Log & Audit Files, Net
Nodes, Servers and all “Smart IoT” Devices
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
74
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can
mitigate risks of new malware that have no prior “signature”.
•• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning
Algorithms can detect the step-by-step penetration of APT
malware (Phishing, Trojans, Adware, Botnets...)
•• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can
quickly expose the malicious activities of malicious “insiders”!
“Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018!
-- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! --
• 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts)
• 1948 – “Cybernetics” – Norbert Wiener
• 1969 – ARPANet Launched – 4 Packet Switching Net Nodes -
• 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn
• 1982 – Elk Cloner - 1st “Apple Computer Virus
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
75
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
• 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp)
• 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee
• 1993 – Mosaic Browser – NCSA – Illinois, USA
• 2018 –Transition to AI/ML Apps for 21stC CyberSecurity!
-- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
76
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
77
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
David ProbertDavid Probert
ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools”
*** Self*** Self--Learning Security ***Learning Security ***
• Major Trends and Developments: Scenario 2020Scenario 2020
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
78
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
79
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm
80
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
81
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
82
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
83
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
84
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
85
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent Security”Intelligent Security”
86
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
66––Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life”
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Cyber“Cyber--Intelligent Security”Intelligent Security”
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
87
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 36 yearsReview Past 36 years-->> 20182018 <<-- Explore Future 36 yearsExplore Future 36 years-->> 20542054
ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots”
88
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective!
19821982 << --Review Past 36 yearsReview Past 36 years-->> 20182018 <<-- Explore Future 36 yearsExplore Future 36 years-->> 20542054
ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security”
• Transition & Full Deployment of Enterprise-Wide
AI/ML-based IntelligentIntelligent “CyberSecurity” Tools
• Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of
Net Traffic, System/Event Logs, Net Nodes, Servers,
Databases, Devices & Users
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
89
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
• Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to
augment Classic Detection using “Known Bad”,“Known Bad”, and
hence provide New Generation “Defence In“Defence In--Depth”Depth”
• Trial Deployment of Autonomous RealAutonomous Real--TimeTime
“Cyber” Alerts that integrate both Traditional &
Advanced AI/ML “Cybersecurity Tools”
HybridHybrid 2121ststC Business OrganisationC Business Organisation
-- Hierarchical & NetworkedHierarchical & Networked --
•• TransitionTransition from 20thC to 21stC Business, Governance & Security
requires fundamental re-structuring of operations:
–– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies -
”Pyramids””Pyramids” - to manually process data/information.
–– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
90
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
& Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds”
•• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of
their extended nervous system (Brain & BodyBrain & Body) to optimise real-time
learning and effective self-organising environmental adaptation!
•• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to
optimise real-time response to Cyber & PhysicalCyber & Physical Attacks.
ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
91
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
92
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
93
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
94
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.nvidia.comwww.nvidia.com
NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
95
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.nvidia.comwww.nvidia.com
NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
96
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.nvidia.comwww.nvidia.com
NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
97
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.nvidia.comwww.nvidia.com
NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
98
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
99
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
www.deepinstinct.comwww.deepinstinct.com
SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled
“Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”...
100
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled
“Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”...
101
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy
-- DistributedDistributed BlockChainBlockChain Payment NetPayment Net --
102
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
77 –– Scenario 2040Scenario 2040: Artificial Silicon Life!: Artificial Silicon Life!
“Neural Security”“Neural Security”
103
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT
“Self“Self--Adaptive”Adaptive”
5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
“Cyber @ Government”“Cyber @ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”“Neural Security”“Neural Security”
Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000”
-- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) --
104
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000”
-- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) --
105
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
ScenarioScenario 20402040:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
106
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
•• Quantum CryptographyQuantum Cryptography for “Unbreakable Codes”!
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 20402040:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
107
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
•• Quantum CryptographyQuantum Cryptography for “Unbreakable Codes”!
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
108
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society”
•• RealReal--Time Security Operations:Time Security Operations:
– Secure and monitor every cyber asset and critical physical asset through IP
Networking, RFID Tagging & communication of status to operations centre
•• Augmented & Immersive Reality:Augmented & Immersive Reality:
– Multimedia virtual world overlays on data from the real physical world,
through head-up displays & other forms of embedded sensors & displays
•• Bio Neural Metaphors:Bio Neural Metaphors:
– Further developments of self-organising and autonomous systems for
monitoring and responding to cyber alerts & attacks in real-time
109
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
monitoring and responding to cyber alerts & attacks in real-time
•• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling:
– Adaptive 3D computer modelling of physical buildings, campuses & cities,
as well as dynamic models of extended enterprises networks. The aim is to
visualise, model & respond to security alerts with greater speed & precision
•• “Smart Security” Architectures:“Smart Security” Architectures:
– Effective integrated security requires management through hybrid
hierarchical and “peer-to-peer” organisational architectures. Living organic
systems also exploit hybrid architectures for optimal command & control
109
ScenarioScenario 20402040: Cyber Defence:: Cyber Defence:
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
110
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds””
•• Neural AI/ML CyberSecurityNeural AI/ML CyberSecurity Solutions will require
enhanced Intelligent Human/Machine Interfaces!
• Human Communications run @ Sound Speed....@ Sound Speed.... whilst
Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!..
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
111
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
Software(SW) will “Bridge” Human & Cyber Worlds!
....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces
for Security Management during the next 7 Years!....7 Years!....
Scenarios:Scenarios: 20192019--20492049:: Blade RunnerBlade Runner
SciSci--Fi SecurityFi Security forfor “Artificial Silicon Life”?!“Artificial Silicon Life”?!
112
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Neural SecurityNeural Security forfor 2121stst CenturyCentury CyberCyber--Physical Society!Physical Society!
Scenarios:Scenarios: 20192019--20492049:: Blade RunnerBlade Runner
SciSci--Fi SecurityFi Security forfor “Artificial Silicon Life”?!“Artificial Silicon Life”?!
113
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Neural SecurityNeural Security forfor 2121stst CenturyCentury CyberCyber--Physical Society!Physical Society!
1984:1984: “Birth”“Birth” of Intelligent Networksof Intelligent Networks
.... &.... & “Death”“Death” of Personal Privacy ?....of Personal Privacy ?....
114
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CyberVision:CyberVision: 1984:1984:PastPast –– 2018:2018:PresentPresent –– 2050:2050:Future?Future?
House of Lords:House of Lords:”AI in the UK””AI in the UK” –– April 2018April 2018
115
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Link:Link: publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf
Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from
Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018)
.......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move
forward on artificial intelligence development butforward on artificial intelligence development but
we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers.
I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If
people design computer viruses, someone willpeople design computer viruses, someone will
116
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
people design computer viruses, someone willpeople design computer viruses, someone will
design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new
form of life that will outperform humans............form of life that will outperform humans............
From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from
Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018)
.......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move
forward on artificial intelligence development butforward on artificial intelligence development but
we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers.
I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If
people design computer viruses, someone willpeople design computer viruses, someone will
117
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
people design computer viruses, someone willpeople design computer viruses, someone will
design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new
form of life that will outperform humans............form of life that will outperform humans............
From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from
Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018)
.......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move
forward on artificial intelligence development butforward on artificial intelligence development but
we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers.
I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If
people design computer viruses, someone willpeople design computer viruses, someone will
Published: 16Published: 16thth Oct 2018Oct 2018
118
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
people design computer viruses, someone willpeople design computer viruses, someone will
design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new
form of life that will outperform humans............form of life that will outperform humans............
From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar
“OUR Cyber Society”“OUR Cyber Society”
22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats
“YOUR Cyber Defence”“YOUR Cyber Defence”
3 –Scenario 2018: Cyber & Physical Tools
“Integrated Security”“Integrated Security”
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
88 –– 2121ststC NationalC National CyberCyber StrategyStrategy
“Cyber“Cyber @@ GovernmentGovernment””
119
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT
“Self“Self--Adaptive”Adaptive”
5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning
“Self“Self--Learning”Learning”
6 – Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence
“Cyber“Cyber--Intelligent”Intelligent”
7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life!
“Neural Security”“Neural Security”
88–– 2121ststCC NationalNational CyberCyber StrategyStrategy
““CyberCyber @ Government”@ Government”
9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!..
“NEW Cyber Toolkit”“NEW Cyber Toolkit”
“Cyber“Cyber @@ GovernmentGovernment””
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Just 121 Nations (62%)Just 121 Nations (62%)
120
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Just 121 Nations (62%)Just 121 Nations (62%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
121
** “CyberVision: 2020 to 2030 ” **
- Your 21stC CyberSecurity ToolKit -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!

More Related Content

What's hot

CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 

What's hot (20)

Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 

Similar to CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!

Similar to CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit! (16)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
 
INSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsINSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy Considerations
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
Whymca 2009
Whymca 2009Whymca 2009
Whymca 2009
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
 
Presentation by Dr Steffi Friedrichs at the 2020 UNIDIR Innovation Dialogues
Presentation by Dr Steffi Friedrichs at the 2020 UNIDIR Innovation DialoguesPresentation by Dr Steffi Friedrichs at the 2020 UNIDIR Innovation Dialogues
Presentation by Dr Steffi Friedrichs at the 2020 UNIDIR Innovation Dialogues
 
Latest Trends in Information Technology - 2020
Latest Trends  in Information Technology - 2020Latest Trends  in Information Technology - 2020
Latest Trends in Information Technology - 2020
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
 
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our PlanetMatthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 

More from Dr David Probert

More from Dr David Probert (7)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!

  • 1. •• CyberVisionCyberVision:: 20202020 toto 20302030 YOURYOUR 2121ststCC CyberSecurityCyberSecurity ToolKitToolKit!! 1 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference YOURYOUR 2121ststCC CyberSecurityCyberSecurity ToolKitToolKit!! Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
  • 2. •• ВидениеВидение кибербезопасностикибербезопасности:: 20202020--20302030 ...21...21ststCC Комплект инструментовКомплект инструментов длядля кибербезопасностикибербезопасности!...!... 2 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference длядля кибербезопасностикибербезопасности!...!... Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana! www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
  • 3. ““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!” Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!... -- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI): -- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes -- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations “Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30 ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!... -- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics 3 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics -- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence... “Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00 Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!... -- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats -- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning -- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !... “Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00 DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 6. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 6 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...“CYBER”“CYBER” == ΚυβερνήτηςΚυβερνήτης == CybernetesCybernetes == “Ship Steersman/Pilot”“Ship Steersman/Pilot”
  • 7. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- 7 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism
  • 8. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 8 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism -- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism --
  • 9. 20002000 Years ago:Years ago: “1“1stst Cyber Mechanism”Cyber Mechanism” -- GreekGreek AntikytheraAntikythera Astronomical CalculatorAstronomical Calculator -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 2012 Representation of2012 Representation of Possible Gearing for thePossible Gearing for the AntikytheraAntikythera MechanismMechanism αντικυθήρααντικυθήρα μηχανισμόμηχανισμό 9 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Cyber YearCyber Year ZeroZero Link:Link:en.wikipedia.orgen.wikipedia.org/wiki//wiki/Antikythera_mechanismAntikythera_mechanism -- Recent Reconstruction ofRecent Reconstruction of AntikytheraAntikythera MechanismMechanism -- αντικυθήρααντικυθήρα μηχανισμόμηχανισμό
  • 10. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 10 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 11. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 11 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 12. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR“YOUR CyberCyber Defence”Defence” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 12 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence ““CyberCyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. ““NeuralNeural Security”Security” 88–– 2121ststC National Cyber Strategy!C National Cyber Strategy! ““Cyber @ GovernmentCyber @ Government”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW“NEW CyberCyber Toolkit”Toolkit”
  • 13. 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR“OUR CyberCyber SocietySociety”” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR“YOUR CyberCyber Defence”Defence” 3 ––Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar 13 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “OUR“OUR CyberCyber SocietySociety”” “YOUR“YOUR CyberCyber Defence”Defence” “Integrated Security”“Integrated Security” 44 –– Scenario 2019Scenario 2019: Internet of Things: Internet of Things--!OT!OT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66 –– Scenario 2025: Artificial IntelligenceScenario 2025: Artificial Intelligence ““CyberCyber--Intelligent”Intelligent” 77 –– ScenarioScenario 2040: Artificial Silicon Life!.2040: Artificial Silicon Life!. ““NeuralNeural Security”Security” 88–– 2121ststC National Cyber Strategy!C National Cyber Strategy! ““Cyber @ GovernmentCyber @ Government”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW“NEW CyberCyber Toolkit”Toolkit” 11 –– CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society”
  • 14. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 14 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 15. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 15 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
  • 16. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 16 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! -- “BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
  • 17. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 17 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! -- “BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
  • 18. British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings --“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 -- 18 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!!
  • 19. British Airways:British Airways: 380k+380k+ OnOn--Line BookingsLine Bookings --“Data Breach”:“Data Breach”: 2121stst AugAug –– 55thth Sept 2018Sept 2018 -- -- MagecartMagecart Java Script SkimmerJava Script Skimmer -- JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!! 19 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference BA Data BreachBA Data Breach Open to Criminals forOpen to Criminals for 15 Days15 Days!!!!!! JustJust 22 lines22 lines ofof “Malicious Code”“Malicious Code”!! FullFull RiskIQRiskIQ Report:Report: www.riskiq.com/blog/labs/magecartwww.riskiq.com/blog/labs/magecart--britishbritish--airwaysairways--breach/breach/ Earlier “Data Breach”:Earlier “Data Breach”: 2211stst April to 28April to 28thth July 2018July 2018 –– 99 Days99 Days!!!.....!!!.....
  • 20. Cathay Pacific:Cathay Pacific: Data Security BreachData Security Breach ..........9.4m9.4m CustomersCustomers “Hacked”:“Hacked”: 2424thth Oct 2018Oct 2018 20 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Personal Data:Personal Data: Passenger Name; Nationality; Date of Birth; #Phone; email;Passenger Name; Nationality; Date of Birth; #Phone; email; Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info...........Address; #Passport ; #ID Card ; #Frequent Flyer; Historical Travel Info........... Market Value:Market Value: 7%7% Share Price Loss :Share Price Loss : $361m$361m Market Cap Loss:Market Cap Loss: 9 Year Low9 Year Low......
  • 21. AndroidAndroid Mobile MalwareMobile Malware:: ““GPlayedGPlayed”” -- Trojan AppTrojan App MimicsMimics “Google Play Store”“Google Play Store” -- 21 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Discovered: 11th Oct 2018 – TALOS/CISCO
  • 22. MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017 Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!... 22 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference *** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
  • 23. MaerskMaersk:: GlobalGlobal RansomwareRansomware -- June 2017June 2017 Cost ofCost of PetyaPetya CyberAttackCyberAttack = $300Million!...= $300Million!... 23 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference *** Estimated*** Estimated $300Million$300Million Profit Impact onProfit Impact on MaerskMaersk Q3 2017Q3 2017 ******
  • 24. MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016 24 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!... “Internet of Threats”!“Internet of Threats”!
  • 25. Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017 25 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...) ....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
  • 26. CyberSecurity:CyberSecurity: Market SectorsMarket Sectors •• AntiAnti--Virus/FirewallVirus/Firewall •• ID AuthenticationID Authentication •• Encryption/PrivacyEncryption/Privacy •• Risk & ComplianceRisk & Compliance •• Mobile Device SecurityMobile Device Security •• AI & Machine LearningAI & Machine Learning •• Enterprise IoT SecurityEnterprise IoT Security •• Cloud Security ServicesCloud Security Services •• Big Data ProtectionBig Data Protection •• RT Log/Event AnalyticsRT Log/Event Analytics 26 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Mobile Device SecurityMobile Device Security •• AntiAnti--Fraud MonitoringFraud Monitoring •• Website ProtectionWebsite Protection •• S/W Code VerificationS/W Code Verification •• RT Log/Event AnalyticsRT Log/Event Analytics •• RealReal--Time Threat MapsTime Threat Maps •• Smart BiometricsSmart Biometrics •• Training & CertificationTraining & Certification Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services... ....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
  • 27. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– TOP 10 Cyber Attacks & ThreatsTOP 10 Cyber Attacks & Threats “Y“YOUR CyberOUR Cyber Defence”Defence” 3 – Scenario 2018Scenario 2018: Cyber & Physical Tools: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 22 –– TOP 10TOP 10 CyberCyber Attacks & Threats!Attacks & Threats! “Y“YOUROUR CyberCyber Defence”Defence” 27 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Scenario 2019Scenario 2019:: Internet of ThingsInternet of Things -- IOTIOT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: ArtificalArtifical Silicon Life!Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststC National Cyber Strategy!C National Cyber Strategy! “Cyber“Cyber @ Government@ Government”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” ThrustSSC – 1st Supersonic Car – October 1997 “Y“YOUROUR CyberCyber Defence”Defence”
  • 28. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 28 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 29. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** BloodHoundBloodHound SSC 2017SSC 2017 ””CyberAttacksCyberAttacks TravelTravel @@ Mach ONE Million!”Mach ONE Million!” 29 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com 1997 Thrust SSC1997 Thrust SSC Mach ONEMach ONE
  • 30. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220M Yrs220M Yrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... 30 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• 20032003-- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans ...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
  • 31. •• 14401440 -- 11stst Printing Press...Printing Press... •• 17901790 -- Industrial RevolutionIndustrial Revolution •• 19431943 -- 11stst Neural NetworksNeural Networks •• 19901990 -- “World“World--WideWide--Web”Web” •• 590MYrs590MYrs -- AnimalsAnimals •• 220M Yrs220M Yrs -- MammalsMammals •• 75MYrs75MYrs -- PrimatesPrimates •• 28MYrs28MYrs –– Lesser ApesLesser Apes ......“Cyber”“Cyber” Evolving @Evolving @ ~~1 Million1 Million--XX--FasterFaster thanthan “Human Life & Intelligence”!...“Human Life & Intelligence”!... Evolution TimeLine ofEvolution TimeLine of “Human Life & Intelligence”“Human Life & Intelligence” 31 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• 20032003-- Social Media/SearchSocial Media/Search •• 20102010 -- “Smart Devices“Smart Devices--IoT”IoT” •• 20162016 -- AI/ML Explosion !...AI/ML Explosion !... •• 15MYrs15MYrs –– Great ApesGreat Apes •• 8MYrs8MYrs –– PrePre--HumansHumans •• 2MYrs2MYrs –– 11stst HumansHumans ...21...21stst “Cyber” (“Cyber” (Silicon AI LifeSilicon AI Life)) Evolves & Communicates atEvolves & Communicates at ~~ 1 Million1 Million--XX--FasterFaster thanthan “Human” (“Human” (Carbon DNA LifeCarbon DNA Life)!...)!... Source:Source: en.wikipedia.org/wiki/Timeline_of_human_evolution
  • 32. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20182018 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 32 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 33. Transition fromTransition from “Cyber Now“Cyber Now -- 20182018”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20182018 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 33 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 34. Global Market forGlobal Market for “Zero“Zero--Day”Day” Exploits!Exploits! 34 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Companies such as DCCompanies such as DC--basedbased Zerodium.comZerodium.com payout for “Zeropayout for “Zero--Day” exploits!Day” exploits!
  • 35. Global Market forGlobal Market for “Zero“Zero--Day”Day” Exploits!Exploits! .....Such.....Such “Zero“Zero--Day”Day” attack risks may be mitigatedattack risks may be mitigated with newly developed “with newly developed “Cybersecurity Defences”Cybersecurity Defences” 35 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Companies such as DCCompanies such as DC--basedbased Zerodium.comZerodium.com payout for “Zeropayout for “Zero--Day” exploits!Day” exploits! with newly developed “with newly developed “Cybersecurity Defences”Cybersecurity Defences” UsingUsing Artificial Intelligence & Machine LearningArtificial Intelligence & Machine Learning!!
  • 36. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 36 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 37. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack 37 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 38. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 38 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 39. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 39 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 40. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 40 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 41. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 41 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists! Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
  • 42. “Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 42 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!... ...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
  • 43. Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812 43 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns! 21stC21stC Cyber WarCyber War && Peace!Peace!
  • 44. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber Defence”Defence” 33 ––ScenarioScenario 20182018: Cyber & Physical Too: Cyber & Physical Toolsls “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 33-- Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security“Integrated Security”” 44 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040:2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @“Cyber @ GovernmentGovernment”” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” Ship: SS Kinsembo – Liverpool to Congo - 1885 “Integrated Security“Integrated Security””
  • 45. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 45 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 46. GlobalGlobal ExplorationExploration -- 18851885 –– 1887 :1887 : Rev Herbert E. ProbertRev Herbert E. Probert -- Travelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICATravelling from Big Horn, Wyoming, USA to Equatorville, Congo, Central AFRICA -- 46 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Life and Scenes in Congo”“Life and Scenes in Congo” –– Published 1889Published 1889 –– FreeFree eBookeBook download from:download from: www.archive.orgwww.archive.org
  • 47. Big HornBig Horn (2) Rock Creek to Big Horn:(2) Rock Creek to Big Horn: Overland Stage CoachOverland Stage Coach 47 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 1919thth C RoadC Road--MapMap –– Rev Herbert E. ProbertRev Herbert E. Probert –– Cheyenne City to Big Horn, WyomingCheyenne City to Big Horn, Wyoming –– 18841884 Cheyenne CityCheyenne City Rock CreekRock Creek (1) Cheyenne City to Rock Creek:(1) Cheyenne City to Rock Creek: Union Pacific RailroadUnion Pacific Railroad
  • 48. 1919ththCC “Missionary Explorer:“Missionary Explorer: Rev Herbert ProbertRev Herbert Probert 48 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Special Exhibition @Special Exhibition @ Museum of Fine Arts, Boston, USAMuseum of Fine Arts, Boston, USA
  • 49. OurOur CyberVisionCyberVision::2018 to 2025+2018 to 2025+ •• ScenarioScenario 20182018 –– Integrated SecurityIntegrated Security:: ManagedManaged “Smart”“Smart” CyberCyber && PhysicalPhysical Operations underOperations under ““CSO”CSO” •• ScenarioScenario 20192019 –– Adaptive Security:Adaptive Security: DistributedDistributed “Smart Security” for networked“Smart Security” for networked “Internet of Things”“Internet of Things” 49 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• ScenarioScenario 20202020 –– Learning Security:Learning Security: Transition toTransition to “Machine Learning”“Machine Learning” Cybersecurity Apps & ToolsCybersecurity Apps & Tools •• ScenarioScenario 20252025 -- Intelligent Security:Intelligent Security: CyberSecurityCyberSecurity based upon Networked “based upon Networked “Artificial Intelligence”Artificial Intelligence” ToolsTools
  • 50. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated Security****** Integrated Security*** • Major Trends & Developments: Scenario 2018Scenario 2018: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 50 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
  • 51. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 51 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 52. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 52 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Dashboard!Dashboard! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things CSIM Example: “VIDSYS Inc - Enterprise 2018”
  • 53. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber“YOUR Cyber DefenceDefence”” 3 –Scenario 2018:Scenario 2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 53 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 ––Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive Security”Adaptive Security” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040: Artificial Silicon Life!Scenario 2040: Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Self“Self--Adaptive Security”Adaptive Security”
  • 54. SelfSelf--Adaptive SecurityAdaptive Security in the Wild!...in the Wild!... * Sociable Weaver Bird ** Sociable Weaver Bird * “World’s Largest Bird Nests”“World’s Largest Bird Nests” *** Southern Africa ****** Southern Africa *** 54 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ••Secure Living CommunitySecure Living Community ••SelfSelf--Organising ArchitectureOrganising Architecture ••Fully scalable for long term growthFully scalable for long term growth ••Supports 250+ Weaver BirdsSupports 250+ Weaver Birds ••RealReal--Time Disaster Alert SystemTime Disaster Alert System ••Sustainable in SemiSustainable in Semi--Desert SteppeDesert Steppe ••Robust against “Enemy Risks”Robust against “Enemy Risks” such as Eagles, Vultures & Snakessuch as Eagles, Vultures & Snakes ...all the features of a 21...all the features of a 21ststCC--“Cyber Defence Centre“Cyber Defence Centre””––including Disaster Recovery & Business Continuity!.....including Disaster Recovery & Business Continuity!.....
  • 55. Scenario 2019Scenario 2019: “Internet of Things: “Internet of Things -- IoT”IoT” *** Self*** Self--Adaptive Security***Adaptive Security*** • Major Trends and Developments: Scenario 2020Scenario 2020 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 55 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 56. 20202020 Estimates forEstimates for “IoT”“IoT” ConnectivityConnectivity 56 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 57. 57 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 58. 20182018 -- 2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 58 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 59. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 59 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 60. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 60 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 61. BlockChainsBlockChains && CryptoCurrenciesCryptoCurrencies •• BlockChainsBlockChains:: Distributed “Spreadsheets “ with Encrypted Verification of “Financial Contracts” – Apps in MOST Economic Sectors for Peer-to-Peer On-Line Trading with NO Central Authority... – Apps from Banks, Governments, & Retail Sectors •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include 61 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• CryptoCurrenciesCryptoCurrencies:: Virtual Currencies include BitCoin, Ethereum, LiteCoin, Ripple & Zcash – Now more than 1000 Virtual CryptoCurrencies!.... – BitCoin is still most widely traded Virtual Currency ... BlockChain AppsBlockChain Apps may improvemay improve CyberSecurityCyberSecurity forfor OnOn--Line TradingLine Trading && Financial Contracts!...Financial Contracts!...
  • 62. Security Printing:Security Printing: Russian BondRussian Bond -- 19101910 62 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
  • 63. Security Printing:Security Printing: Russian BondRussian Bond -- 19101910 63 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
  • 64. Security Printing:Security Printing: Russian BondRussian Bond -- 19101910 64 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
  • 65. Security Printing:Security Printing: Russian BondRussian Bond -- 19101910 65 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference FromFrom 1919ththCC Security PrintingSecurity Printing toto 2121ststCC BlockchainsBlockchains!!
  • 66. New Russia Company Limited:New Russia Company Limited: ””ЮзовкаЮзовка”” 66 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Steel Works :Steel Works : ЮзовкаЮзовка -- c1890c1890 ““HughsovkaHughsovka”” --now “Donetsk”now “Donetsk” Great GrandfatherGreat Grandfather : Edwin James WilliamsEdwin James Williams
  • 67. 19thC19thC “Troika Trip”“Troika Trip” NearNear ““HughesovkaHughesovka// ЮзовкаЮзовка”” with Great Grandfather (Edwin James Williams)with Great Grandfather (Edwin James Williams) 67 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference“Troika“Troika””–– Near Hughesovka (now Donetsk, Ukraine)Near Hughesovka (now Donetsk, Ukraine) –– c1890c1890 – www.Valentina.Net/ewww.Valentina.Net/e--archive.htmlarchive.html
  • 68. Campus Net & Web Project Team:Campus Net & Web Project Team: -- Donetsk Technical UniversityDonetsk Technical University -- 19961996 68 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 69. Security Printing:Security Printing: Russian BondRussian Bond -- 19121912 69 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
  • 70. Security Printing:Security Printing: Russian BondRussian Bond -- 19121912 70 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
  • 71. Security Printing:Security Printing: Russian BondRussian Bond -- 19121912 71 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ““BlockchainsBlockchains”” == ““2121ststCC TransactionTransaction SecuritySecurity””
  • 72. Security Printing:Security Printing: Odessa BondOdessa Bond -- 19131913 72 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Financial SecurityFinancial Security Printing startedPrinting started MidMid--1919ththCC......
  • 73. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 33 ––ScenarioScenario 2018:2018: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning 73 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “OUR Cyber Society”“OUR Cyber Society” “YOUR Cyber Defence”“YOUR Cyber Defence” “Integrated Security”“Integrated Security” 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 55 ––ScenarioScenario 2020:2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 –Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” 55 ––Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning Security”Learning Security”
  • 74. AI & Machine Learning asAI & Machine Learning as Cyber ToolsCyber Tools •• Artificial Intelligence (AI) :Artificial Intelligence (AI) : Developed during 1960s/70s : Neural Networks, Expert Systems, Self-Organising Automata, Adaptive Stochastic Learning, Algorithms, Robotics, Autonomous Systems, Augmented Reality •• Behavioural Modelling:Behavioural Modelling: AI/ML can be applied to real-time modelling of ALL Network Traffic, Log & Audit Files, Net Nodes, Servers and all “Smart IoT” Devices •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can 74 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• ZeroZero--Day Attacks:Day Attacks: AI Modelling & Machine Learning can mitigate risks of new malware that have no prior “signature”. •• Advanced Persistent Threats (APTs):Advanced Persistent Threats (APTs): Adaptive Learning Algorithms can detect the step-by-step penetration of APT malware (Phishing, Trojans, Adware, Botnets...) •• Insider Threats & Attacks:Insider Threats & Attacks: Enterprise AI Traffic Modelling can quickly expose the malicious activities of malicious “insiders”!
  • 75. “Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018! -- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! -- • 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts) • 1948 – “Cybernetics” – Norbert Wiener • 1969 – ARPANet Launched – 4 Packet Switching Net Nodes - • 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn • 1982 – Elk Cloner - 1st “Apple Computer Virus • 1986 – “Brain” – 1st Microsoft MS-DOS Virus 75 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference • 1986 – “Brain” – 1st Microsoft MS-DOS Virus • 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp) • 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee • 1993 – Mosaic Browser – NCSA – Illinois, USA • 2018 –Transition to AI/ML Apps for 21stC CyberSecurity! -- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
  • 76. Evolution of Stochastic AutomataEvolution of Stochastic Automata:: Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 76 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 77. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 77 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference David ProbertDavid Probert
  • 78. ScenarioScenario 20202020:: “Advanced Cyber Tools”“Advanced Cyber Tools” *** Self*** Self--Learning Security ***Learning Security *** • Major Trends and Developments: Scenario 2020Scenario 2020 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 78 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 79. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 79 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 80. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm 80 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 81. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 81 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 82. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 82 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 83. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 83 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 84. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 84 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 85. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 85 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 86. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 66 ––Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent Security”Intelligent Security” 86 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –– Scenario 2019Scenario 2019:: Internet of Things: IoTInternet of Things: IoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 66––Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – ScenarioScenario 2040: Artificial Silicon Life”2040: Artificial Silicon Life” “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Cyber“Cyber--Intelligent Security”Intelligent Security”
  • 87. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 87 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 36 yearsReview Past 36 years-->> 20182018 <<-- Explore Future 36 yearsExplore Future 36 years-->> 20542054
  • 88. ScenarioScenario 20252025:: “Intelligent Defence Bots”“Intelligent Defence Bots” 88 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference TRONTRON (1982):(1982): SciSci--Fi Security Perspective!Fi Security Perspective! 19821982 << --Review Past 36 yearsReview Past 36 years-->> 20182018 <<-- Explore Future 36 yearsExplore Future 36 years-->> 20542054
  • 89. ScenarioScenario 2025:2025: ““Intelligent Security”Intelligent Security” • Transition & Full Deployment of Enterprise-Wide AI/ML-based IntelligentIntelligent “CyberSecurity” Tools • Real-Time Behavioural ModellingBehavioural Modelling of ALL aspects of Net Traffic, System/Event Logs, Net Nodes, Servers, Databases, Devices & Users • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to 89 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference • Focus on AI/ML ModellingAI/ML Modelling of the “Known Good”“Known Good” to augment Classic Detection using “Known Bad”,“Known Bad”, and hence provide New Generation “Defence In“Defence In--Depth”Depth” • Trial Deployment of Autonomous RealAutonomous Real--TimeTime “Cyber” Alerts that integrate both Traditional & Advanced AI/ML “Cybersecurity Tools”
  • 90. HybridHybrid 2121ststC Business OrganisationC Business Organisation -- Hierarchical & NetworkedHierarchical & Networked -- •• TransitionTransition from 20thC to 21stC Business, Governance & Security requires fundamental re-structuring of operations: –– 2020ththC Industrial Organisations:C Industrial Organisations: HierarchicalHierarchical Bureaucracies - ”Pyramids””Pyramids” - to manually process data/information. –– 2121ststC Intelligent Organisations:C Intelligent Organisations: NetworkedNetworked Peer-to-Peer Business & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” 90 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference & Agencies with data processed in Global “BIG Cyber Clouds”“BIG Cyber Clouds” •• Living SystemsLiving Systems, such as Mammals & Birds, use HybridHybrid Organisation of their extended nervous system (Brain & BodyBrain & Body) to optimise real-time learning and effective self-organising environmental adaptation! •• Intelligent Security SolutionsIntelligent Security Solutions will also require HybridHybrid organisation to optimise real-time response to Cyber & PhysicalCyber & Physical Attacks. ScenarioScenario 20252025 Business will evolve to IntelligentBusiness will evolve to Intelligent HybridHybrid Security Operations!Security Operations!
  • 91. 91 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 92. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 92 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 93. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 93 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 94. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 94 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.nvidia.comwww.nvidia.com NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
  • 95. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 95 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.nvidia.comwww.nvidia.com NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
  • 96. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 96 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.nvidia.comwww.nvidia.com NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute
  • 97. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 97 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.nvidia.comwww.nvidia.com NVIDIANVIDIA –– Machine Learning GPUs & Deep Learning InstituteMachine Learning GPUs & Deep Learning Institute www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 98. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 98 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
  • 99. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 99 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat *** www.deepinstinct.comwww.deepinstinct.com
  • 100. SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled “Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”... 100 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 101. SenseonSenseon:: Enterprise AIEnterprise AI--EnabledEnabled “Cyber Intelligence & Analysis”...“Cyber Intelligence & Analysis”... 101 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 102. SingularityNetSingularityNet:: Platform for AI EconomyPlatform for AI Economy -- DistributedDistributed BlockChainBlockChain Payment NetPayment Net -- 102 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LaunchLaunch:: Oct 2017Oct 2017 -- Web:Web: singularityNet.iosingularityNet.io -- FounderFounder:: Dr BenDr Ben GoertzelGoertzel
  • 103. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018Scenario 2018:: Cyber & Physical ToolsCyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 77 –– Scenario 2040Scenario 2040: Artificial Silicon Life!: Artificial Silicon Life! “Neural Security”“Neural Security” 103 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things -- IoTIoT “Self“Self--Adaptive”Adaptive” 5 -Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 – Scenario 2025:Scenario 2025: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 77 –– ScenarioScenario 20402040:: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy “Cyber @ Government”“Cyber @ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit”“Neural Security”“Neural Security”
  • 104. Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000” -- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) -- 104 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
  • 105. Artificial IntelligenceArtificial Intelligence:: “HAL 9000”“HAL 9000” -- 20012001 -- A Space OdysseyA Space Odyssey (1968)(1968) -- 105 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference A Space OdysseyA Space Odyssey -- 19681968 –– 20182018 –– 20682068 -- Artificial Silicon Life?Artificial Silicon Life?
  • 106. ScenarioScenario 20402040:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, 106 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society •• Quantum CryptographyQuantum Cryptography for “Unbreakable Codes”! • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 107. ScenarioScenario 20402040:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, 107 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society •• Quantum CryptographyQuantum Cryptography for “Unbreakable Codes”! • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 108. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 108 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 109. Security Futures:Security Futures: Towards “Neural Society”Towards “Neural Society” •• RealReal--Time Security Operations:Time Security Operations: – Secure and monitor every cyber asset and critical physical asset through IP Networking, RFID Tagging & communication of status to operations centre •• Augmented & Immersive Reality:Augmented & Immersive Reality: – Multimedia virtual world overlays on data from the real physical world, through head-up displays & other forms of embedded sensors & displays •• Bio Neural Metaphors:Bio Neural Metaphors: – Further developments of self-organising and autonomous systems for monitoring and responding to cyber alerts & attacks in real-time 109 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference monitoring and responding to cyber alerts & attacks in real-time •• 3D Adaptive Simulation & Modelling:3D Adaptive Simulation & Modelling: – Adaptive 3D computer modelling of physical buildings, campuses & cities, as well as dynamic models of extended enterprises networks. The aim is to visualise, model & respond to security alerts with greater speed & precision •• “Smart Security” Architectures:“Smart Security” Architectures: – Effective integrated security requires management through hybrid hierarchical and “peer-to-peer” organisational architectures. Living organic systems also exploit hybrid architectures for optimal command & control 109
  • 110. ScenarioScenario 20402040: Cyber Defence:: Cyber Defence: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 110 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 111. InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds”” •• Neural AI/ML CyberSecurityNeural AI/ML CyberSecurity Solutions will require enhanced Intelligent Human/Machine Interfaces! • Human Communications run @ Sound Speed....@ Sound Speed.... whilst Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!.. •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & 111 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & Software(SW) will “Bridge” Human & Cyber Worlds! ....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces for Security Management during the next 7 Years!....7 Years!....
  • 112. Scenarios:Scenarios: 20192019--20492049:: Blade RunnerBlade Runner SciSci--Fi SecurityFi Security forfor “Artificial Silicon Life”?!“Artificial Silicon Life”?! 112 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Neural SecurityNeural Security forfor 2121stst CenturyCentury CyberCyber--Physical Society!Physical Society!
  • 113. Scenarios:Scenarios: 20192019--20492049:: Blade RunnerBlade Runner SciSci--Fi SecurityFi Security forfor “Artificial Silicon Life”?!“Artificial Silicon Life”?! 113 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Neural SecurityNeural Security forfor 2121stst CenturyCentury CyberCyber--Physical Society!Physical Society!
  • 114. 1984:1984: “Birth”“Birth” of Intelligent Networksof Intelligent Networks .... &.... & “Death”“Death” of Personal Privacy ?....of Personal Privacy ?.... 114 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference CyberVision:CyberVision: 1984:1984:PastPast –– 2018:2018:PresentPresent –– 2050:2050:Future?Future?
  • 115. House of Lords:House of Lords:”AI in the UK””AI in the UK” –– April 2018April 2018 115 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Link:Link: publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf
  • 116. Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018) .......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move forward on artificial intelligence development butforward on artificial intelligence development but we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers. I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If people design computer viruses, someone willpeople design computer viruses, someone will 116 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference people design computer viruses, someone willpeople design computer viruses, someone will design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new form of life that will outperform humans............form of life that will outperform humans............ From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
  • 117. Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018) .......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move forward on artificial intelligence development butforward on artificial intelligence development but we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers. I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If people design computer viruses, someone willpeople design computer viruses, someone will 117 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference people design computer viruses, someone willpeople design computer viruses, someone will design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new form of life that will outperform humans............form of life that will outperform humans............ From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
  • 118. Artificial Intelligence:Artificial Intelligence: Warnings fromWarnings from Professor Stephen HawkingProfessor Stephen Hawking (1942(1942--2018)2018) .......The genie is out of the bottle........The genie is out of the bottle. We need to moveWe need to move forward on artificial intelligence development butforward on artificial intelligence development but we also need to be mindful of its very real dangers.we also need to be mindful of its very real dangers. I fear that AI may replace humans altogetherI fear that AI may replace humans altogether. If. If people design computer viruses, someone willpeople design computer viruses, someone will Published: 16Published: 16thth Oct 2018Oct 2018 118 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference people design computer viruses, someone willpeople design computer viruses, someone will design AI that replicates itself.design AI that replicates itself. This will be a newThis will be a new form of life that will outperform humans............form of life that will outperform humans............ From anFrom an Interview with WiredInterview with Wired -- November 2017November 2017
  • 119. 1-CyberCyberCrime:Crime:CyberCyberTerror:Terror:CyberCyberWarWar “OUR Cyber Society”“OUR Cyber Society” 22 –– “TOP 10“ Cyber Attacks & Threats“TOP 10“ Cyber Attacks & Threats “YOUR Cyber Defence”“YOUR Cyber Defence” 3 –Scenario 2018: Cyber & Physical Tools “Integrated Security”“Integrated Security” CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 88 –– 2121ststC NationalC National CyberCyber StrategyStrategy “Cyber“Cyber @@ GovernmentGovernment”” 119 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Scenario 2019:Scenario 2019: Internet of ThingsInternet of Things--IoTIoT “Self“Self--Adaptive”Adaptive” 5 –Scenario 2020:Scenario 2020: Machine LearningMachine Learning “Self“Self--Learning”Learning” 6 – Scenario 2025Scenario 2025:: Artificial IntelligenceArtificial Intelligence “Cyber“Cyber--Intelligent”Intelligent” 7 – Scenario 2040:Scenario 2040: Artificial Silicon Life!Artificial Silicon Life! “Neural Security”“Neural Security” 88–– 2121ststCC NationalNational CyberCyber StrategyStrategy ““CyberCyber @ Government”@ Government” 9 –CyberCyber VISIONVISION to Securityto Security NOWNOW!..!.. “NEW Cyber Toolkit”“NEW Cyber Toolkit” “Cyber“Cyber @@ GovernmentGovernment””
  • 120. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Just 121 Nations (62%)Just 121 Nations (62%) 120 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Just 121 Nations (62%)Just 121 Nations (62%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 121. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 121 ** “CyberVision: 2020 to 2030 ” ** - Your 21stC CyberSecurity ToolKit - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf