Cyber Security and The Cloud
-
Upload
laura-bedell-pearce -
Category
Technology
-
view
82 -
download
1
Transcript of Cyber Security and The Cloud
![Page 1: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/1.jpg)
Cyber Security&
The CloudTOM ILUBE, CEO
![Page 2: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/2.jpg)
A series of round-table lunches and dinners in London and Edinburgh, hosted by Crossword Over 60 information security executives (CISOs, Heads of IT Security,
Leading Consultancy firms, supplier Executives, senior Government officials)
Question: what problems is industry concerned about 3 years out?
Discussions held under the Chatham House Rule
Some strong, consistent themes emerged. Some key points of divergence amongst the groups.
Seven themes picked to share today
The view from 2018
![Page 3: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/3.jpg)
Within the next 3 years there will be a “cyber fatality” so large that it will fundamentally change the way industry executives relate to cyber
50:50 split on this bold assertion
1) “Prepare for a major cyber fatality”
![Page 4: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/4.jpg)
Every entity becomes a collection of loosely-coupled organisations that form “chains of trust”
The concept of a “perimeter” is redundant. Better to think of your company as being in an ecosystem
2) “There is no perimeter”
![Page 5: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/5.jpg)
Every employee of every supplier, partner, contractor is an “insider”
Divisions between home and work life breaks down Bring Your Own Vulnerability (BYOV)
“The fabric of peoples lives is digital”
3) “They will be inside us and we won’t even know”
![Page 6: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/6.jpg)
Explosive growth of old style criminals into cyber
Groups of threat actors co-operating methodically e.g. crime, terrorist, state, activists
Technically adept white collar criminals, linked to manipulating shares & insider trading
Foreign nation states will leak advanced tools to the mass market
4) “Hackers for hire”
![Page 7: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/7.jpg)
Collaboration is vital within and across industries and with Government agencies
Mutual trust is essential
Speed & standardisation of threat intelligence sharing
5) “We need a neighbourhood watch”
![Page 8: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/8.jpg)
With the emergence of the Internet of Things the attack surface expands exponentially
Vast amounts of data to be managed. Continuous data leakage We keep everything because of the few items that
might be useful.
6) Attack surface expands massively
![Page 9: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/9.jpg)
7) Is the Cloud secure enough yet?
DoS39%
Access63%
Insiders 43%
Hijacking
61%
Insecure APIs 41%
Source: CIO Insight 2015
![Page 10: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/10.jpg)
A lot of money is going into Cloud security
![Page 11: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/11.jpg)
Where is Cloud security research taking place?
![Page 12: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/12.jpg)
A huge range of fascinating projects
![Page 13: Cyber Security and The Cloud](https://reader036.fdocuments.us/reader036/viewer/2022062711/55c47fd5bb61eb4f498b474a/html5/thumbnails/13.jpg)
COED: Computing On Encrypted Data
10011010010111110010101010100010101101110101010111010011100111000100010110010101100110101010101010010101010111
Multi Party Computation