UX Trends for Startups leveraging Voice & Text - Phonegap Meetup - 4YFN - MWC
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
-
Upload
carlos-valderrama -
Category
Documents
-
view
159 -
download
1
Transcript of [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
![Page 1: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/1.jpg)
CYBER SECURITY INNOVATION
AN URGENT CALL FOR CYBER HEROS
![Page 2: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/2.jpg)
ME
Co-founder -> Cyber Security Hub – Barcelona
Founder and VP Engineering -> Innovating: Crime and
fraud detection/prevention platform
Managing Director -> Helping to find the most disruptive
Cyber Security startups
Carlos Valderrama
Over 15 years in Cyber Security, Computer Forensics and Cyber Intelligence
![Page 3: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/3.jpg)
CURRENT SITUATION What’s happening out there?
![Page 4: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/4.jpg)
Cyber Security Incidents reported to the U.S. CERT
CURRENT SITUATION
![Page 5: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/5.jpg)
CURRENT SITUATION
![Page 6: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/6.jpg)
ATMs, POS, Banking Trojans, contactless pickpockets, etc, etc, etc.
CURRENT SITUATION
![Page 7: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/7.jpg)
It’s clear that the security procedures utilized by companies today (big and small) is completely failing and with the huge growth of IoT products (from smart fridges to Barbie dolls) of which many are buggy from the factory, criminals are not only compromising our data but also that of our family
CURRENT SITUATION
![Page 8: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/8.jpg)
IoT devices
CURRENT SITUATION
![Page 9: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/9.jpg)
• Marketing • State-sponsored • Competitiveness • Crime/Terrorism
Privacy and Cyber Espionage
CURRENT SITUATION
![Page 10: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/10.jpg)
CURRENT SITUATION
Air traffic control systems, railways, power stations, water plants, cars, etc, etc.
Terrorism
![Page 11: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/11.jpg)
Cyber terrorism
CURRENT SITUATION
“Premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of Investigation
![Page 12: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/12.jpg)
Crypto War 2.0 - Apple Case
CURRENT SITUATION
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
![Page 13: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/13.jpg)
REAL TIME ATTACKS
![Page 14: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/14.jpg)
The battle
CURRENT SITUATION
![Page 15: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/15.jpg)
Why are the bad guys winning?
CURRENT SITUATION
![Page 16: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/16.jpg)
CURRENT MODEL New challenges, old methods
![Page 17: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/17.jpg)
CURRENT MODEL
• Complexity is the enemy of security • Complexity is expensive • Simplicity is the ultimate sophistication – Leonardo Davinci • Simplicity is the complexity resolved – Constantin Brancusi
![Page 18: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/18.jpg)
CYBER SECURITY DISRUPTION
Digital disruption
![Page 19: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/19.jpg)
CYBER SECURITY DISRUPTION
You know the Cyber Security Disruption is not happening when…
• Telco providers • Power plants • Banks • Computers • Smartphones • Pacemakers • Email providers • Browsers • Operating Systems • Social Networks • Cars • Drones • …
Everyone and everything is getting hacked!
We can’t detect it and prevent it
> >
![Page 20: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/20.jpg)
CYBER SECURITY
Innovation is the answer
![Page 21: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/21.jpg)
CYBER SECURITY
Companies
Corporate network, corporate servers and
computers, Internet Services, Internet of Things, Online Banking, BYOD, Online
Services
Citizens
Internet of Things, Personal computers, Online services, Cars, Smart city technology,
Mobile phones, Apps, Internet Services, Online
Banking, Drones
Government
Government network, Government servers and computers, Government
data, Public records, eGovernment, Online
services, International affairs
Public Infrastructure
Critical infrastructure, smart
cities, Cars, Internet of Things and connected devices, traffic lights,
Security Cameras, Public transport infrastructure
CYBER SECURITY
![Page 22: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/22.jpg)
THE MARKET Cyber Security
![Page 23: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/23.jpg)
WHY CYBER SECURTIY?
“In 2014 venture capitalists invested a record amount in privately held companies in the Cyber Security industry“
“In 2014, companies reported 42.8 million detected attacks worldwide, a 48% YoY increase”
“The Cyber Security Market will be worth $170.21 Billion by 2020”
“$3.3 billion invested in Cyber Security by VCs in 2015 – VCs chasing Rising Cyber Security Spending”
“Cyber Security startup Tanium raising new VC at $2.5 billion valuation”
“Investors are pouring billions into Cyber Security firms”
![Page 24: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/24.jpg)
THE MOVERS & SHAKERS
Some of the leading European startups making a change in the Cyber Security sector
Makers of the Blackphone. Silent Circle provides multiplatform secure communication services for mobile devices and desktop
Develops continuous authentication and verification technology that provides identity and access management solutions
The easy browser extension that hides your IP address, encrypts your traffic and protects your privacy
Scytl develops secure electronic voting and electoral modernization solutions for the public and private sectors
Telegram is a cloud-based instant messaging service. Telegram messages are heavily encrypted and can self-destruct
The world leader in Enterprise Immune System technology for cyber security
Silobreaker is a data analytics company specialising in cyber security and risk intelligence.
Provides cyber situational awareness that helps organizations protect against cyber attacks and loss of intellectual property
![Page 25: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/25.jpg)
THE MAP
For more detail, the table can be found here.
![Page 26: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/26.jpg)
BIG CYBER SECURITY EXITS
![Page 27: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/27.jpg)
INVESTMENT HISTORY
![Page 28: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/28.jpg)
INVESTMENT HISTORY
![Page 29: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/29.jpg)
SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year (REUTERS)
![Page 30: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/30.jpg)
THE NECESSITY Players
![Page 31: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/31.jpg)
THE BIG PICTURE
University/Education
Government
Niche Investors/Accelerators
Startups
Corporations
Cyber Security Community
Women
Men
![Page 32: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/32.jpg)
CYBER HEROES NEEDED
Lean startup Fellow founders
Funding Legal
Sales Marketing/Growth Hacking
Cyber Security Operations
![Page 33: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/33.jpg)
CYBER HEROES NEEDED
![Page 34: [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM](https://reader031.fdocuments.in/reader031/viewer/2022022414/588477751a28ab5e248b5f83/html5/thumbnails/34.jpg)
JOIN US We want you!