the double-edged sword challenge

12
Cybersecurity & innovation the double-edged sword challenge CEPS - Keynote Gérôme BILLOIS [email protected] (+33) 6 10 99 00 60 @gbillois

Transcript of the double-edged sword challenge

Page 1: the double-edged sword challenge

Cybersecurity & innovationthe double-edged sword challenge

CEPS - Keynote

Gérôme [email protected]

(+33) 6 10 99 00 60@gbillois

Page 2: the double-edged sword challenge

© WAVESTONE 2

Who am I?

Gérôme BILLOIS, Partner Cybersecurity & Digital Trust

@gbillois

Experience feedback from our

3500professionals

14countries

600consultants and experts

in Cybersecurity & Digital Trust

Page 3: the double-edged sword challenge

© WAVESTONE 3

Non-targeted ransomware mostly affecting individuals (since 2010)

Waves of non-targeted ransomware affecting companies (since 2015)

Targeted Ransomware”Big Game Hunting”

(since 2018)

Targeted ransomware also leaking data

(since end of 2019)

In 2021, Ransomware will remain the threat #1…

But what is coming next?Improved attackers' capabilitiesNew ways to “ensure” payment

Credits: Yoso999, DeviantArt © WAVESTONE

Page 4: the double-edged sword challenge

© WAVESTONE 4

NEW CLOUD

ATTACKS

PROVIDER

HACKING

THE RANSOMWARE

HYDRA

© WAVESTONE

that will carry on 2021...3 Trends

Page 5: the double-edged sword challenge

© WAVESTONE 5

Important Profits

• DDOS : $20 to hundred of $ / hour

• Credit card data: 3 to $150 / card

• Personal data : 0,3 to $2 / person

• Business fraud/spying: thousands of $

Accessible expertise

• Skills widely available

• Black Market of Attack Tools

• Mafia organization

Increasing number of targets

• Digital transformation of companies

• Broad spread of technologies to the public

A rapidly

CYBERCRIMEGROWING

Impunity

• Anonymization / absence of trails

• Complex legal response

• Cryptocurrencies

Becoming a

for

CHALLENGE

POLICY MAKING

Attack profitability and complexify money laundering

Increase international cooperation and judiciary efficiency

Increase cyber security level “by design” for companies and suppliers

Regulate and criminalize part of the market

Page 6: the double-edged sword challenge

© WAVESTONE 6

loud

But criminals know how to exploit new Cloud featuresExposed database, identity and access management higher complexity…

C

…and many new security technologiesAPI, transparence cybersecurity, Zero-Trust, CASB…

Cloud adoption is slowed by cyber borders / protectionismMultiplication of policies and regulations avoiding free flows of data

Cloud is already and will be an enabler for an industrialized vision of IT…Large scale, flexibility…

A new hope with confidential computing?Ability to work on encrypted data without decrypting it

Page 7: the double-edged sword challenge

© WAVESTONE 7

rtificial intelligence

A target for cybercriminals AI poisoning, inference, evasion

A tool for cybercriminalsAI-powered reconnaissance, social engineering, breaking captcha…

A

But also a key tool for cybersecurityAutomation of attack detection and reaction…

Gradient Masking

DefensiveDistillation

Pro

ce

ssin

g

AdversarialLearning

Advanced Learning

Le

arn

ing

Moderator Black List

Ou

tpu

ts

FilteringForce noisePrevention

Inp

uts

And many innovations to protect AI are required

Page 8: the double-edged sword challenge

© WAVESTONE 8

rtificial intelligence

A target for cybercriminals AI poisoning, inference, evasion

A tool for cybercriminalsAI-powered reconnaissance, social engineering, breaking captcha…

A

But also a key tool for cybersecurityAutomation of attack detection and reaction…

Gradient Masking

DefensiveDistillation

Pro

ce

ssin

g

AdversarialLearning

Advanced Learning

Le

arn

ing

Moderator Black List

Ou

tpu

ts

FilteringForce noisePrevention

Inp

uts

Many innovations to protect AI

A glimpse into the future…

1st AI-basedhacking tournament

Organized by DARPA

The Cyber Grand Challenge - 2016

$55M reward for the winner

7 super computers with (flawed)

services to protect

Page 9: the double-edged sword challenge

© WAVESTONE 9

uantum computing and communications

A major threat for cryptographyA Quantum Computer (around 2040) might be able to break RSA2048, security corner stone or our communication

Q

But also a key opportunity for cybersecurityQuantum Key Distribution & Quantum Random Number Generators

Page 10: the double-edged sword challenge

© WAVESTONE 10

uantum computing and communications

A major threat for cryptographyA Quantum Computer (around 2040) might be able to break RSA2048, security corner stone or our communication

Q

But also a key opportunity for cybersecurityQuantum Key Distribution & Quantum Random Number Generators

0

1

2

3

4

6

Pre-quantum networks

Proto-quantum networks

Advanced quantum networks

Basic quantum link between classical nodes, already exist in some large cities of Switzerlands, Japan, China…

Quantum link with quantum nodes (or repeaters),experimented in laboratories for the moment and asatellite experimentation carried out by a Chinese teamlinking 2 quantum nodes.

Quantum computer interconnection with quantum link and quantum nodes (or repeaters)

Only theorical for now

Stage Network typology Research & development

6 steps towards the Quantum Internet…

Page 11: the double-edged sword challenge

© WAVESTONE 11

A real

for

CHALLENGE

POLICY MAKING

THREATS QUICKLY ADAPTING WITH HUGE CAPABILITIES

TECHNOLOGIES EVOLVING AT THE SPEED OF LIGHT

POLICIES THAT SHOULD ENABLE AND NOT BLOCK FINDING THE RIGHT BALANCE

Page 12: the double-edged sword challenge

wavestone.com @wavestone_

Gérôme BilloisPartner

M +33 (0)6 10 99 00 60

[email protected]