1 of 28

Slide Notes

DownloadGo Live

Cybersecurity, Europe Leads The Way (CeBIT - 21/03/2017)

Friend or Foe ? Yes, but how many ?

PRESENTATION OUTLINE

cybersecurity

EuropA leads the way

A talk about

PRIVACY in DIGITAL ERA, SURVEILLANCE (to the power of I) and CYBERSECURITY.

The next big thing (!), if you're looking for a job GO for CYBERSECURITY.

Photo by Rob Unreall

in data we trust

dataism: ideology of the third millenium
Photo by Andrea Kirkby

ONE INTERNET second

  • 2 574 107 emails sent
  • 68 578 videos viewed (YouTube)
  • 59 362 searches (Google)
  • 2 510 calls (Skype)
  • 772 photos uploaded (Instagram)

context

DATA, however, IS NOTHING WITHOUT
Photo by r2hox

WHO SHOULD I MARRY ?

one of the most important decisions in life
Who should I marry ?

My mother would have said:

"My son, listen to your heart. If it is the womanfor life, you'll feel it. Feel the "butterflies" and you'll kown"

My daughter, however, would eventually listen to "Google Now" or "Apple Siri". That'll tell her:

"I know you since your birth. I read all your emails, registered your voice-calls, saw your movies. I even know your DNA and you're complete biometrical history. I register your heartbeat, your blood pressure and sugar level during your dates. I do know as much about Fred, John and Paul. So I say that, with a 87% of probability, that John is the best choice in the long run."
Photo by 1upLego

Take John !

your Personal Contextual Assistant
"I know that you secretly won't like that response, preferring Paul, because he's more handsome. But event considering this, studies showed that attractivity makes only for 14% of a stable relation. For a the long term relation, I tell you, take John!"
Photo by JD Hancock

contextual computing

Welcome to the age of
some would say "smart compunting", in the essence it's he same
Photo by Thomas Hawk

the five Forces of context

MOBILE - SOCIAL media - DATA - LOCATION - SENSORS
these 5 forces, represent somehow our 5 senses, making technology behave and "think" like us, humans.
Photo by MickaZed

glass

anticipates what you want to see, eat, buy or know
"Google Glass", is a good example. It's tomorrow's Personal Contextual Assistant, that already today anticipates your choices. Registering the movement of you eyes and analysing what you look at.

Glass will know what you want to see, and will show it, it'l know what you want to eat and will order it. Glass will know what you want to buy, and'll deliver it to your home.

backscatter traffic: "MIRAI ddos" (2016)

Another example: the mirai botnet, who heard bout that one ?

It's the proof that IoT makes our lives worse and criminal lives easier.

Last year's DDOS against Brian Krebs' website (who knows Brian ?), surpassed everything we saw until then (up to 1Tbps). And this using a botnet of cameras, VCRs and other home-cinemas.

Only in Luxembourg my CIRCL team detected half a million backscatter tentatives per day.

Akamai considered: "€œThis was the biggest attack we’ve ever seen", Martin McKeay, the senior security advocate for Akamai.

2016 - year of the ransomware

2016 was also the year of the ransomware, Kaspersky identified an attack every 40 seconds.

storm's coming

prepare & CARE for change - be THE change
Photo by Jesse Kruger

trust is the new currency

Photo by aotaro

Lessons learned from (recent) history

  • technology misuse/abuse
  • data as surveillance
  • piercing anonymity
  • loss of trust & confidence
  • unhealthy fatality
Photo by Tim Geers

not new, but worsening

go for Edward Snowden's speech if you don't believe me

Untitled Slide

Photo by YanniKouts

#GDPR

general data protection regulation
Photo by arnoKath

RESILIENT DESIGN

Photo by Jsome1

PRIVACY AND SECURITY

Photo by mommy peace

cybersecurity

the next big market
Photo by rhlinuxguy

cybersecurity market - global figures

cybersecurity market - figures for europe

cybersecurity job openings

competence areas

  • Prevenitve (awareness raising, training...)
  • Operational (AV, WAF, IPS, SIEM, MISP...)
  • Organisational (policies, risk mgmt, MONARC...)
  • Compliance (privacy, IP...)
  • "Hacking" (metasploit, sleuthkit...)
Photo by nixter

you heroes!

we need you!
Photo by 1upLego

take the challenge

and visit us: h11D04 (just behind you)

cybersecurity ecosystem Luxembourg

thank you - PASCAL STEICHEN
Merci pour votre attention.

SECURITYMADEIN.LU