Crim cybersecurity_jarno_limnéll

47
We ´ re living in the Cyber Era and New Security Actions are needed for blurring security Jarno Limnéll Professor of Cyber Security, Aalto University Director of Cyber Security, McAfee Doctor of Military Science Twitter: @JarnoLim

Transcript of Crim cybersecurity_jarno_limnéll

Page 1: Crim cybersecurity_jarno_limnéll

We´re living in the Cyber Era and New Security

Actions are needed for blurring security

Jarno Limnéll Professor of Cyber Security, Aalto UniversityDirector of Cyber Security, McAfeeDoctor of Military ScienceTwitter: @JarnoLim

Page 2: Crim cybersecurity_jarno_limnéll
Page 3: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

DIGITAL AND PHYSICAL BLUR

Page 4: Crim cybersecurity_jarno_limnéll
Page 5: Crim cybersecurity_jarno_limnéll

“THE FUTURE OF… SECURITY

IS IN THIS ROOM”

Page 6: Crim cybersecurity_jarno_limnéll

Resources are needed, but in cyber big brains are more important than big brawn…

Page 7: Crim cybersecurity_jarno_limnéll

What are the right and needed skills?

Challenge for Universities.

Page 8: Crim cybersecurity_jarno_limnéll

“The most important thing to us is human capital. Everything within the cyber domain relies upon the strength of our personnel. Therefore, we must restructure our education system. The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.”

Israel Defense Forces

Page 9: Crim cybersecurity_jarno_limnéll

SECURITY ENVIRONMENT –PHYSICAL AND DIGITAL

– IS MORE UNCERTAIN, DYNAMIC AND MORE DEMANDING THAN EVER

Page 10: Crim cybersecurity_jarno_limnéll

Power is the ability to affect other people and countries to get the outcomes one wants.

Cyber PowerHow cyber power will be distributed in the world?

Page 11: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

The importance of combining technological and strategic thinking -both are needed in order to have comprehensive approach to cybersecurity,its threats and solutions

Strategic Intellectual challenge

Page 12: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

Page 13: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

The Digital Domain has become a domain where

strategic advantage (national, industrial or military)

can be lost or won.

Page 14: Crim cybersecurity_jarno_limnéll

1. Cyberattacks, cyber-espionage2. Counterintelligence3. Terrorism4. WMD Profiliferation5. Counterspace

Page 15: Crim cybersecurity_jarno_limnéll

We’re living the Cyber Era

Page 16: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

NATO – Cyber – Article 5

Page 17: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

Page 18: Crim cybersecurity_jarno_limnéll
Page 19: Crim cybersecurity_jarno_limnéll

Cyber is already and will be an element of all crisis we’re going to see in the future

Page 20: Crim cybersecurity_jarno_limnéll

Continuation of politics by other means,

incl. cyber means in ”policy toolbox”

Page 21: Crim cybersecurity_jarno_limnéll
Page 22: Crim cybersecurity_jarno_limnéll

IN THE SHADOWS,

3 levels of cyber activities

Lower level cyber activitiesDigital information operationsStrategic cyber attacks

Page 23: Crim cybersecurity_jarno_limnéll
Page 24: Crim cybersecurity_jarno_limnéll

“The supreme art of war is to subdue the enemy

without fighting.”Sun Tzu, The Art of War

Page 25: Crim cybersecurity_jarno_limnéll

Beginning – End

Our side – Their side

Military – Civilian

Involved – Not-involved

Win – Lose

Violence – Non-violence

Hardware – Software

Page 26: Crim cybersecurity_jarno_limnéll

26

Lack of precedents, Cyber conflict playbook is pretty empty (at the moment)

Page 27: Crim cybersecurity_jarno_limnéll

The world is moving towards a greater strategic use of cyber

activities to persuade others to change their behavior.

Capability and will.

Page 28: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

Trendsto Follow

Page 29: Crim cybersecurity_jarno_limnéll

Level of Cyber capabilities?

SUSPICION,STATE-CENTRISISM

Page 30: Crim cybersecurity_jarno_limnéll
Page 31: Crim cybersecurity_jarno_limnéll

OutsourcingWorrying trend

Page 32: Crim cybersecurity_jarno_limnéll

It’s difficult to know exactly who’s doing what to whom

I don’t think anyone’s hands are clean

Page 33: Crim cybersecurity_jarno_limnéll

“Skilled team of developers and operators collecting intelligence on defense and geopolitical issues –intelligence that would only be useful to a government.”

“Operations that indicate agovernment sponsor –specifically, a government based in Moscow. “

“APT28 targets insider information related to governments, militaries, and security organizations that would likely benefit the Russian government.”

“…since at least 2007.”

Page 34: Crim cybersecurity_jarno_limnéll

“Axiom is responsible for directing highly sophisticated cyber espionage operations against numerous Fortune 500 companies, journalists, environmental groups… for at least the last six years.”

“…the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.”

Page 35: Crim cybersecurity_jarno_limnéll

Does intelligence collection or cyber reconnaissance become an act of war?

Intelligence collection that involves the theft of terabytes of classified information may eventually be interpreted as an act of war.

This is what the grey space between war and peace looks like, and we are in it .

Page 36: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

World and security changes -unpredictably

?

Page 37: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

(Cyber) Resiliency

Page 38: Crim cybersecurity_jarno_limnéll

Smart players in thefield are moving from a traditional framework of defense to an approach of resilience.

Page 39: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

Instead of (only) building walls,”Defense in depth”

Page 40: Crim cybersecurity_jarno_limnéll

I am waiting to see a disruptive innovation in Cyber Security within next 2-3 years.

A disruptive innovation is an innovation that disrupts an existing market.

Page 41: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

TRUST

Page 42: Crim cybersecurity_jarno_limnéll

Survata survey, October 2014.

Page 43: Crim cybersecurity_jarno_limnéll
Page 44: Crim cybersecurity_jarno_limnéll
Page 45: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

Page 46: Crim cybersecurity_jarno_limnéll

.

McAfee Confidential

The dawn of the Cyber era

2001 2002 2003 2004 2006 2007 2008 2009 2010 2011 2012 2013

Wikipedia

Georgia

Conficker

Stuxnet Flame

Gauss

Saudi Aramco

Anonymous

Twitter

Manning

Skype

Gmail

Tumblr

Android

Dropbox

iPadiPhone

Estonia

Pinterest

Google+

LulZSEc Snowden

2005

YouTube

WEB 2.0

Wikileaks

Facebook

Page 47: Crim cybersecurity_jarno_limnéll

[email protected]

twitter: @JarnoLim