Cyber trust: cornerstone of a digital world
-
Upload
leonardo -
Category
Presentations & Public Speaking
-
view
160 -
download
2
Transcript of Cyber trust: cornerstone of a digital world
Andrea Biraghi Security & Information Systems Division Managing Director
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
2
4BUsers 2019
5.9BSmartphone
Connections 2020
44 ZBData zettabytes in
2020
24.4BIP-connecteddevices 2019
200BIoT Devices 2019
159 B$Global public cloud market
2020
168 EBExabytes/month
in IP traffic in 2019
0Downtime &
Latency request
In 5 years
Explosion of hyperconnectivity
Cyber security and physical security will be increasingly connected to each other.
Society will work largely with the help of the cyber world.
Need to protect complex, networked, engineered physical/cyber/virtual systems.
3
The future
Physical and Digital worlds overlapping at an
unprecedented rate
Biotechnologies, blockchain,
nanotechnologies, robotics, 3d
printing, cyber-physical systems,
massive usage of augmented
reality and artificial intelligence.
Societies will be a networked cyber
physical ecosystem of services,
systems, people, information
Information Technology, Connectivity and
Robotics convergence
Low investments, limited risks, disruptive effects.
Whatever the objective, the cyber option will be
more and more appealing for hostile entities.
4
Some signals
NATO declared Cyber the 5th Battlespace domain
Digital Trust is first inhibitor factor to unchain UE Digital Single Market
Cyber is a main point in most of Nations, Board Room & CISO Agendas
Connected everything fuels the emergence of
new attack vectors
Impacted sectors
TransportAutonomous systems, Situational awareness
SecurityDrone technology, Weapon systems,
Situational awareness
EnergySmart grid and innovative
EMS/DMS
HealthcareSmart medical devices,
Big data. robotics
BankingBlockchain technology
Question
How to manage this complexity for scenarios
like Terrorism, Cybercrime, Immigration Flows and Border control, Protection and Resilience
of Transportation, Communications, Energy,
Manufacturing?
How to keep TRUST?
Cyber evolution: from silos to ecosystems
5
How to keep trust
Build a Trust Relationships Circles among us as Security System Integrators, the Cyber Community and all the Customers.
This is driven by the need to cooperate with a new set of stakeholders, providers and end-users, with technological assets becoming suddenly correlated.
Cyber CommunityPut in place a real community of security and blue light stakeholders.
Security ProcessFollow and somehow lead the Customers in measuring their exposure and building their security processes and capabilities.
Cyber Technology PartnersManage a liquid ecosystem of technologies and Vendors.Concentrate the developments on core technologies.
Security ServiceShift from buying technologies to capabilities aaS. Keep the pace of the evolution.
6
Leonardo:the Security System Integrator in the new ecosystem
Manageoptimize and reduce
intervention and damages,through integrated
platforms for ″Security and Resilience″
Manageoptimize and reduce
intervention and damages,through integrated
platforms for ″Security and Resilience″
ProtectExploit cyber-
physical security systems, strictly
cooperating
ProtectExploit cyber-
physical security systems, strictly
cooperating
PreventUse intelligence systems
and information from sensors anticipatory
signals
PreventUse intelligence systems
and information from sensors anticipatory
signals
How to keep leaderships?
Improving Customer incident response capability
Developing Cyber Threat Intelligence, essential for information security
Specializing feeds per domain, integrating HUMan Intelligence
7
Developing technologies like Automation to react to a cyber attack, Machine Learning, Prediction models, and Human Intelligence integration
Integrating cyber in products like Cyber Warfare, RPAS - Drone technology, Situational awareness, Unmanned Vehicle Control, Avionics – Traffic Control Security, Energy Grids
Improving our capabilities best in class, 2 SOC/CSIRT (in Italy & UK), 1 NOC, 1 intelligence Operation Centre for Threat Intelligence, OSINT and dark web analysis
Being a solid cornerstone of the Cyber Security trust ecosystem
Our plan: target European Excellence In Cyber Industry
Integrating security approach and portfolio: physical + wireless + cyber
Protecting wireless sensor networks, cloud computingenvironments, Machine-to-Machine communicationsystems, robotics applications, and drones (UAVs).
Having contributed to start the ECSO Security
association, Leonardo will support the creation of an
Italian chapter as national public-private partnership
THANK YOU FOR YOUR ATTENTION
Andrea BiraghiManaging DirectorSecurity & Information Systems DivisionLeonardo SpA