SlideShare uma empresa Scribd logo
1 de 112
Baixar para ler offline
Cyber Tools and TrendsCyber Tools and Trends
Next 7 Years: 2018Next 7 Years: 2018 -- 20252025
1
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Next 7 Years: 2018Next 7 Years: 2018 -- 20252025
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail, Alice & TatianaAbigail, Alice & Tatiana –– Securing YOUR Life !Securing YOUR Life !
КиберКибер Сервис и ТенденцииСервис и Тенденции
Следующие 7 ЛетСледующие 7 Лет: 2018: 2018 -- 20252025
2
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Следующие 7 ЛетСледующие 7 Лет: 2018: 2018 -- 20252025
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail, Alice & TatianaAbigail, Alice & Tatiana –– Securing YOUR Life !Securing YOUR Life !
“C“Cybersecurityybersecurity Trends”:Trends”: Dual ThemesDual Themes
Theme (1)Theme (1) –– ..........Practical Cyber DefencePractical Cyber Defence against TOP 10 Cyber Threats.....against TOP 10 Cyber Threats.....
--
“Networked”“Networked” :: “Real“Real--Time Cyber Security & SurveillanceTime Cyber Security & Surveillance”” 09:4509:45 66thth June 2017June 2017
We review PracticalWe review Practical CyberDefenceCyberDefence against Threats, Hacks & Attacksagainst Threats, Hacks & Attacks
fromfrom RansomwareRansomware, BotNets(DDoS), Key Logging, Insider Threats,, BotNets(DDoS), Key Logging, Insider Threats,
Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),
AdvancedAdvanced PersistantPersistant Attacks (APT), Virus/Trojan & Web/Cookie Hacks.Attacks (APT), Virus/Trojan & Web/Cookie Hacks.
3
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ThemeTheme (2)(2) –– ..........Cyber Tools & Trends:Cyber Tools & Trends: The Next 7 years: 2018The Next 7 years: 2018 –– 2025.....2025.....
--
“Neural”“Neural” :: “New Generation Networked Neural Security"“New Generation Networked Neural Security" 14:1514:15 66thth June 2017June 2017
Download SlideDownload Slides:s: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/
We present Cyber Trends & Scenarios for 2018 (Cyber Transition),We present Cyber Trends & Scenarios for 2018 (Cyber Transition),
2020 (Intelligent Security) and 2025 (Neural Security). We discuss2020 (Intelligent Security) and 2025 (Neural Security). We discuss
the Evolution of Advanced AI based Cyber Tools with Applicationsthe Evolution of Advanced AI based Cyber Tools with Applications
to Smart Devices (IoT), Smart Transportation & Smart Cities.to Smart Devices (IoT), Smart Transportation & Smart Cities.
4
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CyberSpaceCyberSpace & Virtual Reality& Virtual Reality:: Hollywood Style!Hollywood Style!
5
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Cyber Reality!”“Cyber Reality!”: Global IPv4 Internet Servers:: Global IPv4 Internet Servers: 24/724/7
Active Internet DomainsActive Internet Domains –– “American IP Registry”“American IP Registry”
6
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): InIn--Depth ZoomDepth Zoom
7
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other Domain RegistriesOther Domain Registries
8
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
MaliciousMalicious Cybercrime ActivityCybercrime Activity inin Global CyberspaceGlobal Cyberspace
Animation: HilbertAnimation: Hilbert
SpaceSpace--Filling CurveFilling Curve
EVERY IP Node “Monitored &EVERY IP Node “Monitored &
Mapped” in Hilbert Space”Mapped” in Hilbert Space”
9
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Link:Link: www.teamwww.team--cymru.orgcymru.org
CyberCyber Crime,Crime, CyberCyber Terror &Terror & CyberCyber WarWar!!
•• 2121ststCC CyberCyber Security:Security: New security threats &
attacks hit our media screens EVERY Day!
•• HybridHybrid CyberCyber--Physical:Physical: The “Bad Guys”“Bad Guys” now
exploit hybrid weapons with hybrid cyber-
physical attacks on critical info infrastructure
10
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
physical attacks on critical info infrastructure
•• 7 Year7 Year CyberCyber Vision:Vision: Business & Government
need to Urgently deploy New Generation
AI/ML Security Solutions to “Win”“Win” the “War”“War”
OurOur “Cyber“CyberVisionVision”” provides the basis for designing practical Strategies, Action Plansprovides the basis for designing practical Strategies, Action Plans
and Roadmaps to combatand Roadmaps to combat CyberCyberCrime,Crime, CyberCyberTerrorTerror && CyberCyberWarWar forfor YOURYOUR Business!Business!
11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
11
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Scenario 2018Scenario 2018: “Cyber Tools Transition”
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Intelligent”“Intelligent”
6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8–From 7 Year7 Year CyberVision to Reality! 9 –YOURYOUR Action Plan for 21stC Cyber!...
““CyberSecurityCyberSecurity @@ Board Level”Board Level”
•• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and
Governments to Plan & Invest @@ Board LevelBoard Level!
• CyberSecurity Tools are now in TransitionTransition from:
– 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls
–– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence
• Smart IoT Devices, Homes & Cities ALL require
12
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• Smart IoT Devices, Homes & Cities ALL require
Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks!
....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for
C$OC$O led Investment in Effective Cyber Defence!
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
13
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
14
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price”
CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017
ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence:
1) Appoint Board Level CSOBoard Level CSO in Leadership Role!
2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
15
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks
......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk
4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists
5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap
6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 22 ––77 YearYear CyberVision: “The New Toolkit”CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
4 –Scenario 2018Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR)
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
16
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 –Scenario 2018Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed”
Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical
Infrastructure , Corporate Assets, Staff and Citizens
*** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec ***
Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks
on, Network Hubs, Servers, Databases & Social Media
*** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec ***
17
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997
Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
7 Year7 Year CyberVision:CyberVision: “The New Toolkit”“The New Toolkit”
• During the last 7 Years CyberThreatsCyberThreats targeted:
–– Critical National Infrastructure (CNI):Critical National Infrastructure (CNI): Energy, Banks,
Transport, Government, Healthcare, Education...
–– Major Events:Major Events: Sports, Elections & Culture Festivals...
–– CriminalCriminal eCommerceeCommerce: “The Dark Web” & “SilkRoad”!
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
18
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time”
Defence against “Zero“Zero--Day”Day” & “Insider”“Insider” Attacks!
• Exponential Increase in Device Connections (IoT)
requires Cyber DefenceCyber Defence through AI/MLAI/ML “Bots”“Bots”
running 24/7 on ALL Networked System Assets!
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
19
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 33 –– CyberSecurity:CyberSecurity: 21stC Neural Defence21stC Neural Defence
4 –Scenario 2018:Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR)
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
20
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 –Scenario 2018:Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Intelligent”“Intelligent”
6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence”
•• “Bad Guys”“Bad Guys” are already deploying Advanced
CyberTools within Organised Crime SyndicatesOrganised Crime Syndicates!
•• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be
“hacked” & exploited with ease by “BotNets”!“BotNets”!
•• CyberDefenceCyberDefence for Business & Government requires
Managed 7 Year Transition to “Speed of Light”“Speed of Light”
21
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Managed 7 Year Transition to “Speed of Light”“Speed of Light”
““Neural Defence”Neural Defence” and “Augmented Reality”Augmented Reality”!
...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for:
20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) andand 20252025 (Neural)(Neural)
Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
22
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
Transition fromTransition from “Cyber Now“Cyber Now -- 20172017””
toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025””
20172017 -- “Cyber Now”“Cyber Now”
•• “Signature” Detection“Signature” Detection
•• MultiMulti--DMZ FirewallsDMZ Firewalls
•• AntiAnti--Virus & MalwareVirus & Malware
•• Supervised LearningSupervised Learning
20252025 -- AI/ML CyberAI/ML Cyber
•• Behaviour ModellingBehaviour Modelling
•• Learning the BaselineLearning the Baseline
•• “Smart Security”“Smart Security”
•• Unsupervised LearningUnsupervised Learning
23
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Supervised LearningSupervised Learning
•• ZeroZero--Day AttacksDay Attacks
•• Objects & AssetsObjects & Assets
•• “Known BAD!”“Known BAD!”
•• Unsupervised LearningUnsupervised Learning
•• ZeroZero--Second AttacksSecond Attacks
•• Events & ExperienceEvents & Experience
•• “Known GOOD!”“Known GOOD!”
ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools
to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – 7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
44 ––Scenario 2018:Scenario 2018: Cyber Tools TransitionCyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: -Augmented Reality(AR)
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
24
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference24
44 ––Scenario 2018:Scenario 2018: Cyber Tools TransitionCyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
6 –Scenario 2025:Scenario 2025: -Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition”
*** Integrated ****** Integrated ***
• Major Trends & Developments: Scenario 2018Scenario 2018:
–– C$O led IntegrationC$O led Integration of Physical and Cyber Security
Assets across Corporate Business and Government :
CCTV, ANPR, Access Control, Cyber Defence & Alerts
25
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
–– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber
Vendors alongside Cylance, Darktrace & Deep Instinct
– Increased National Government PriorityNational Government Priority & Investment
in fighting Organised CyberCrime and CyberTerrorism
...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity
Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations
Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
SharedShared
AlertsAlerts
26
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Corporate CSOCorporate CSO--led Security Teamled Security Team
ONEONE –– Shopping List!Shopping List!
Integrated Management,Integrated Management,
Training, Standards, PlansTraining, Standards, Plans
ONEONE –– Architecture!Architecture!
Smart SecuritySmart Security == Virtual IntegrationVirtual Integration
FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
“Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM
•• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices
•• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement
•• SIEM:SIEM: SSecurity IInformation & EEvent MManagement
27
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
20172017--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6
28
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned)
2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”)
-- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
29
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference29
4 –Scenario 2018:Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
55 ––ScenarioScenario 2020:2020: AI & Machine LearningAI & Machine Learning
““Adaptive”Adaptive”
6 –Scenario 2025:Scenario 2025: Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
Scenario 2020Scenario 2020: “AI & Machine Learning”: “AI & Machine Learning”
*** Adaptive ****** Adaptive ***
• Major Trends and Developments: Scenario 2020Scenario 2020
–– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions
– Updated ISO/NISTISO/NIST Standards with Adaptive Security
– Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
30
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
– Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO
– International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO)
.....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive
Modelling of “Normal” Net/User Behaviour &
Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
SelfSelf--Organisation:Organisation: Cellular AutomatonCellular Automaton
****** Emergence of Patterns from Random Chaos ***Emergence of Patterns from Random Chaos ***
31
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator:
****** BelousovBelousov––Zhabotinsky Reaction (BZ) ***Zhabotinsky Reaction (BZ) ***
32
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set
33
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
34
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CarnaCarna BotnetBotnet exposed Legacyexposed Legacy
Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
35
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020
36
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
IERCIERC –– Research Cluster Reports onResearch Cluster Reports on
““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things
37
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb
Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl”
38
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
CyberCyber 20202020 Visions:Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton
and The Australian Government (Defence)and The Australian Government (Defence)
39
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
40
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity
-- The Enterprise Immune SystemThe Enterprise Immune System --
www.darktrace.comwww.darktrace.com
41
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour...
...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
42
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
43
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection
44
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!!
--****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
www.www.deepdeepinstinct.cominstinct.com
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
45
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
46
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017
47
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU
****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
“Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity”
usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning
UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
48
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
49
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
50
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
51
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Scenario 2018:Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
66 –– Scenario 2025:Scenario 2025: Augmented Reality(AR)Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
ScenarioScenario 2025+2025+:: “Augmented Reality”“Augmented Reality”
*** Neural Security ****** Neural Security ***
• Major Trends and Developments: Scenario 2025Scenario 2025
- Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools
-- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices
-- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
52
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
-- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security
- Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to
Search & Quarantine Resources linked with suspected
CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells!
....Business & Government CyberCyber Networks & Assets
now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
ScenarioScenario 2025+2025+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
53
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
ScenarioScenario 2025+2025+:: “Neural Security”“Neural Security”
• Full Implementation of Intelligent & Adaptive
Cybersecurity across the Extended EnterpriseExtended Enterprise
•• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based
Cyber Event, Traffic & User Modelling
• New Scaled Architectures and Operational Standards
54
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• New Scaled Architectures and Operational Standards
for “Smart Systems”“Smart Systems” – Smart Devices, Business,
Cities, Government, Economy & Society
• Cybersecurity Operations transition to become
Ultra-Intelligent – “Neural Security”“Neural Security” – through
Embedded “AI-Security Bots” for Real-Time Defence
Artificial Neural NetworksArtificial Neural Networks applied toapplied to
RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing
55
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Algorithmic Computer Trading usingAlgorithmic Computer Trading using RealReal--Time Neural NetsTime Neural Nets
& Statistical Maths Tools have been used for& Statistical Maths Tools have been used for 25+25+ Years!Years!
.....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent
realreal--time forecasts for enterprisetime forecasts for enterprise cybersecuritycybersecurity threats!threats!
Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading
@@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks
56
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
57
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
58
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.nvidia.comwww.nvidia.com
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
59
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
60
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
61
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Deep Learning & Neural NetworksDeep Learning & Neural Networks
AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions
62
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
63
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert)
64
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling
65
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm
66
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Smart Glass”:“Smart Glass”: Augmented RealityAugmented Reality
-- Meta VisionMeta Vision ARAR HeadSetHeadSet:: 20172017 --
67
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Augmented Reality:Augmented Reality: “Skiing Challenge”“Skiing Challenge”
68
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Augmented RealityAugmented Reality –– ““Location Paris”Location Paris”
69
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Technology Visions:Technology Visions: ScenarioScenario 20252025
70
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios
*** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon ***
71
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040
72
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ScenarioScenario 20402040: Cyber Defence:: Cyber Defence:
UK Ministry of DefenceUK Ministry of Defence -- MODMOD
73
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada
74
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
75
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Scenario 2018:Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
“Neural Security”“Neural Security”
77 –– “Interfacing Human and Cyber Worlds”“Interfacing Human and Cyber Worlds” 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds””
•• Neural AI/MLNeural AI/ML CyberSecurityCyberSecurity Solutions will require
enhanced Intelligent Human/Machine Interfaces!
• Human Communications run @ Sound Speed....@ Sound Speed.... whilst
Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!..
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
76
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices &
Software(SW) will “Bridge” Human & Cyber Worlds!
....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces
for Security Management during the next 7 Years!....7 Years!....
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
77
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge:
-- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence --
78
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
4 – Scenario 2018Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
79
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Scenario 2018Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 88 –– FromFrom 7 Year7 Year Cyber Vision to Reality!Cyber Vision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
“From“From 77 YearYear CyberVisionCyberVision toto RealityReality!”!”
• 7 Year Evolution of Business “$“$ecurityecurity Culture”Culture”
•• Cyber RoadMapCyber RoadMap managed by Board-Level C$O
• Integrated Security with Intelligent AI Alerts!Intelligent AI Alerts!
• Professional Cyber TrainingCyber Training for EVERY Business
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
80
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff”
•• Trial and DeployTrial and Deploy Adaptive AI Security Solutions
.....CyberSecurityCyberSecurity now requires $$$$$$ Investment in
Teams & Technology to Mitigate Major Risks!...Mitigate Major Risks!...
UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021
DefendDefend –– DeterDeter -- DevelopDevelop
81
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor
Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016
DefendDefend –– DeterDeter -- DevelopDevelop
Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture
82
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework
83
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified
by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG
84
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CyberTerrorismCyberTerrorism @ World Counter Terror@ World Counter Terror
CongressCongress –– Olympia, LondonOlympia, London –– April 2017April 2017
85
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence”
4 – Scenario 2018:Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025
86
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Scenario 2018:Scenario 2018: Cyber Tools Transition
“Integrated”“Integrated”
5 –Scenario 2020:Scenario 2020: AI & Machine Learning
“Adaptive”“Adaptive”
6 – Scenario 2025:Scenario 2025: Augmented Reality(AR)
“Neural Security”“Neural Security”
7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 99 –– YOURYOUR Action Plan for 21stC Cyber!...Action Plan for 21stC Cyber!...
YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!...
• Every CSO needs Board-Level Approval for Annual
Security Business Plan that includes CyberSecurity
• YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include:
–– Investment BudgetInvestment Budget for Integrated Security Solutions
–– Job SpecificationsJob Specifications for Professional “Cyber” Team
87
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Job SpecificationsJob Specifications for Professional “Cyber” Team
–– Security Staff TrainingSecurity Staff Training & Professional Development
–– Technical & OperationalTechnical & Operational Plans & Upgrades
–– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards
.....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
“Cyber Defence”“Cyber Defence” againstagainst “Organised Crime”“Organised Crime”
Adaptive SecurityAdaptive Security providesprovides
Intelligent Cyber DefenceIntelligent Cyber Defence
againstagainst 21stC21stC Cyber CrimeCyber Crime!!
88
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Plan“Plan YOURYOUR CybersecurityCybersecurity
Defence CampaignDefence Campaign NOWNOW!”!”
Bulgakov’s Devil Cat – БегемотБегемот - Master & Margarita - 1972
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
89
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
The Final Countdown!:The Final Countdown!: CyberTerrorCyberTerror StrikesStrikes
@@ “Light Speed”“Light Speed” across Global Networks!across Global Networks!
90
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
“CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
91
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
“CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
“CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
ThankThank--You!You!ThankThank--You!You!
92
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
EastEast--West Security ConferenceWest Security Conference –– Genoa 2017Genoa 2017
--“21stC CyberSecurity Trends”“21stC CyberSecurity Trends”--
93
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download Link:Download Link: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/
Theme (1)Theme (1) ––“TOP 10 Cyber Threats”“TOP 10 Cyber Threats” Theme (2)Theme (2) ––““CyberTrendsCyberTrends: 2018: 2018--2025”2025”
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
94
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
95
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
96
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
97
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download:Download: www.valentina.net/DigiTec2012/
“CyberSecurity Trends & Tools”:“CyberSecurity Trends & Tools”: 20182018––2025!2025!
3535thth International EastInternational East--West Security Conference: Genoa, ItalyWest Security Conference: Genoa, Italy
98
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Surfing the Evolutionary“Surfing the Evolutionary Cyber Waves”Cyber Waves”
-- More than 45 Years45 Years of AI & CyberSecurityAI & CyberSecurity! -
• 1970 – BT Research Labs – IBM 360 –Digital PCM
• 1976 – AI Thesis – Stochastic Learning Automata
• 1982 – AI & Expert Systems: UK Govt Programme
• 1991 – EARN/TERENA: European Networks Board
• 1992 – International Net Conference: RAS, Moscow
• 1994 – EMEA – Internet, Security & eCommerce
99
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• 1994 – EMEA – Internet, Security & eCommerce
• 2007 – Georgian Parliament Security Projects
• 2009 – Armenia eGovernance & CyberSecurity
• 2010 – Georgian Cybersecurity Audit & Roadmap
......Global Marketplace for......Global Marketplace for ”Cyber” AI/ML Apps”Cyber” AI/ML Apps willwill
mainstream during themainstream during the Next 7 Years: 2018Next 7 Years: 2018 –– 20152015 !!
BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970
100
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
-- Dept of Mathematics & StatisticsDept of Mathematics & Statistics --
Cambridge UniversityCambridge University :: 19731973 -- 19761976
101
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
David ProbertDavid Probert
Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76
The Evolution ofThe Evolution of
Stochastic AutomataStochastic Automata
David Eric ProbertDavid Eric Probert -- 19761976
102
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf
SelfSelf--Organisation & AdaptationOrganisation & Adaptation
Of Stochastic Learning AutomataOf Stochastic Learning Automata
To Dynamic EnvironmentsTo Dynamic Environments
David Eric ProbertDavid Eric Probert -- 19761976
Churchill College, CambridgeChurchill College, Cambridge
Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC
103
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
From:From: “Business Blueprint”:“Business Blueprint”: ProbertProbert –– July 1989July 1989
2525thth Anniversary:Anniversary: “KolaNet”“KolaNet” -- Nuclear SecurityNuclear Security
104
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
KolaNetKolaNet Project:Project: 1992 to 19971992 to 1997 –– Kola PeninsulaKola Peninsula –– Russian ArcticRussian Arctic
Control RoomControl Room -- Kola Nuclear Power StationKola Nuclear Power Station -- RussiaRussia
105
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Kola Nuclear Power Main Control
KolaNetKolaNet Project forProject for Nuclear SecurityNuclear Security ::19921992--19971997
106
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
““Human AdaptationHuman Adaptation in thein the ArcticArctic””
* Kola Science Centre :* Kola Science Centre : ApatityApatity, Russia, Russia **
Launched:Launched: 20162016
107
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
R&D Centre forR&D Centre for Human AdaptationHuman Adaptation in thein the ArcticArctic -- Kola ScienceKola Science Centre:Centre:medbioarctic.rumedbioarctic.ru
*Researching Human*Researching Human HealthHealth,, SafetySafety && SecuritySecurity in Extreme Arctic Environments*in Extreme Arctic Environments*
Protecting Ukraine & Georgian ParliamentsProtecting Ukraine & Georgian Parliaments
-- Integrated Cyber and Physical SecurityIntegrated Cyber and Physical Security --
108
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Internet, Web Sites, & IT Security Programmes initiated 1994Internet, Web Sites, & IT Security Programmes initiated 1994
Ukraine ParliamentUkraine Parliament :: KyivKyiv Georgian Parliament:Georgian Parliament: TbilisiTbilisi
Project Team:Project Team: Almaty, KazakhstanAlmaty, Kazakhstan -- 19951995
109
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cybersecurity forCybersecurity for Georgian Parliament:Georgian Parliament: 20072007 -- 20102010
110
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
...Critical Infrastructure Review & RoadMap:...Critical Infrastructure Review & RoadMap: UN/ITU CybersecurityUN/ITU Cybersecurity –– Georgian GovernmentGeorgian Government
Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia
111
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
Cybersecurity &Cybersecurity & eGoveGov Missions:Missions: 20092009--20122012
**Mt AragatsMt Aragats –– South Summit(3879m):South Summit(3879m): ArmeniaArmenia**
112
-- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends --
“From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference

Mais conteúdo relacionado

Mais procurados

Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 

Mais procurados (20)

Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 

Semelhante a Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...Year of the X
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersRick Huijbregts
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasJessica Tams
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
Data, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeCisco Canada
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Koncept Analytics
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security EconomyBehnaz Aria
 
Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Dr. Kim (Kyllesbech Larsen)
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Matthew Bailey
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and YouCaroline Dunn
 
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing SecurityFrom the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing SecurityDug Song
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017MYO AUNG Myanmar
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017Filipp Paster
 

Semelhante a Cyber Tools and Trends - Next 7 Years: 2018 - 2025 ! (20)

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
 
Urban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and PartnersUrban Mobility -- w/ UP Express and Partners
Urban Mobility -- w/ UP Express and Partners
 
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie LlamasWhen Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
When Money Isn’t a Good Thing: The Risks of Investing in VR | Stephanie Llamas
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Data, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for Change
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing SecurityFrom the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017
 

Mais de Dr David Probert

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Mais de Dr David Probert (7)

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !

  • 1. Cyber Tools and TrendsCyber Tools and Trends Next 7 Years: 2018Next 7 Years: 2018 -- 20252025 1 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Next 7 Years: 2018Next 7 Years: 2018 -- 20252025 Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail, Alice & TatianaAbigail, Alice & Tatiana –– Securing YOUR Life !Securing YOUR Life !
  • 2. КиберКибер Сервис и ТенденцииСервис и Тенденции Следующие 7 ЛетСледующие 7 Лет: 2018: 2018 -- 20252025 2 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Следующие 7 ЛетСледующие 7 Лет: 2018: 2018 -- 20252025 Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Abigail, Alice & TatianaAbigail, Alice & Tatiana –– Securing YOUR Life !Securing YOUR Life !
  • 3. “C“Cybersecurityybersecurity Trends”:Trends”: Dual ThemesDual Themes Theme (1)Theme (1) –– ..........Practical Cyber DefencePractical Cyber Defence against TOP 10 Cyber Threats.....against TOP 10 Cyber Threats..... -- “Networked”“Networked” :: “Real“Real--Time Cyber Security & SurveillanceTime Cyber Security & Surveillance”” 09:4509:45 66thth June 2017June 2017 We review PracticalWe review Practical CyberDefenceCyberDefence against Threats, Hacks & Attacksagainst Threats, Hacks & Attacks fromfrom RansomwareRansomware, BotNets(DDoS), Key Logging, Insider Threats,, BotNets(DDoS), Key Logging, Insider Threats, Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL), AdvancedAdvanced PersistantPersistant Attacks (APT), Virus/Trojan & Web/Cookie Hacks.Attacks (APT), Virus/Trojan & Web/Cookie Hacks. 3 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ThemeTheme (2)(2) –– ..........Cyber Tools & Trends:Cyber Tools & Trends: The Next 7 years: 2018The Next 7 years: 2018 –– 2025.....2025..... -- “Neural”“Neural” :: “New Generation Networked Neural Security"“New Generation Networked Neural Security" 14:1514:15 66thth June 2017June 2017 Download SlideDownload Slides:s: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/ We present Cyber Trends & Scenarios for 2018 (Cyber Transition),We present Cyber Trends & Scenarios for 2018 (Cyber Transition), 2020 (Intelligent Security) and 2025 (Neural Security). We discuss2020 (Intelligent Security) and 2025 (Neural Security). We discuss the Evolution of Advanced AI based Cyber Tools with Applicationsthe Evolution of Advanced AI based Cyber Tools with Applications to Smart Devices (IoT), Smart Transportation & Smart Cities.to Smart Devices (IoT), Smart Transportation & Smart Cities.
  • 4. 4 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference CyberSpaceCyberSpace & Virtual Reality& Virtual Reality:: Hollywood Style!Hollywood Style!
  • 5. 5 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference “Cyber Reality!”“Cyber Reality!”: Global IPv4 Internet Servers:: Global IPv4 Internet Servers: 24/724/7
  • 6. Active Internet DomainsActive Internet Domains –– “American IP Registry”“American IP Registry” 6 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 7. Cyberspace (Hilbert Map):Cyberspace (Hilbert Map): InIn--Depth ZoomDepth Zoom 7 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 8. “Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other Domain RegistriesOther Domain Registries 8 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 9. MaliciousMalicious Cybercrime ActivityCybercrime Activity inin Global CyberspaceGlobal Cyberspace Animation: HilbertAnimation: Hilbert SpaceSpace--Filling CurveFilling Curve EVERY IP Node “Monitored &EVERY IP Node “Monitored & Mapped” in Hilbert Space”Mapped” in Hilbert Space” 9 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Link:Link: www.teamwww.team--cymru.orgcymru.org
  • 10. CyberCyber Crime,Crime, CyberCyber Terror &Terror & CyberCyber WarWar!! •• 2121ststCC CyberCyber Security:Security: New security threats & attacks hit our media screens EVERY Day! •• HybridHybrid CyberCyber--Physical:Physical: The “Bad Guys”“Bad Guys” now exploit hybrid weapons with hybrid cyber- physical attacks on critical info infrastructure 10 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference physical attacks on critical info infrastructure •• 7 Year7 Year CyberCyber Vision:Vision: Business & Government need to Urgently deploy New Generation AI/ML Security Solutions to “Win”“Win” the “War”“War” OurOur “Cyber“CyberVisionVision”” provides the basis for designing practical Strategies, Action Plansprovides the basis for designing practical Strategies, Action Plans and Roadmaps to combatand Roadmaps to combat CyberCyberCrime,Crime, CyberCyberTerrorTerror && CyberCyberWarWar forfor YOURYOUR Business!Business!
  • 11. 11 –– “CyberSecurity @ Board Level“CyberSecurity @ Board Level”” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 11 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Scenario 2018Scenario 2018: “Cyber Tools Transition” “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Intelligent”“Intelligent” 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8–From 7 Year7 Year CyberVision to Reality! 9 –YOURYOUR Action Plan for 21stC Cyber!...
  • 12. ““CyberSecurityCyberSecurity @@ Board Level”Board Level” •• HighHigh CyberSecurity RisksCyberSecurity Risks require Business and Governments to Plan & Invest @@ Board LevelBoard Level! • CyberSecurity Tools are now in TransitionTransition from: – 11stst Gen:Gen: Malware Signatures & Perimeter Firewalls –– 22ndnd Gen:Gen: Machine Learning & Artificial Intelligence • Smart IoT Devices, Homes & Cities ALL require 12 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • Smart IoT Devices, Homes & Cities ALL require Embedded CyberSecurityEmbedded CyberSecurity in Chips & Networks! ....We provide a 7 Year CyberVision7 Year CyberVision & RoadMap for C$OC$O led Investment in Effective Cyber Defence!
  • 13. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 13 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection
  • 14. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 14 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks ......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!...
  • 15. CyberAttacksCyberAttacks:: “Impact on Share Price”“Impact on Share Price” CGI & Oxford EconomicsCGI & Oxford Economics –– April 2017April 2017 ReportReport RecommendsRecommends followingfollowing CyberSecurity Defence:CyberSecurity Defence: 1) Appoint Board Level CSOBoard Level CSO in Leadership Role! 2) Include CyberSecurityCyberSecurity on EVERY Board AgendaEVERY Board Agenda 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 15 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.cgiwww.cgi--group.co.uk/group.co.uk/CyberValueConnectionCyberValueConnection InvestorsInvestors have lost at leasthave lost at least £42Billion£42Billion sincesince 20132013 due todue to Cyber AttacksCyber Attacks ......Severe Cyber AttacksSevere Cyber Attacks typicallytypically wipe outwipe out £120M£120M of company value!...of company value!... 3) Consider CyberSecurityCyberSecurity as TransTrans--Business RiskBusiness Risk 4) RecruitRecruit & TrainTrain Professional Cyber SpecialistsCyber Specialists 5) Establish Cyber OperationsCyber Operations $$$Budget$$$Budget & RoadMap 6) Assume that Cyber DefencesCyber Defences are already BreachedBreached!...
  • 16. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 22 ––77 YearYear CyberVision: “The New Toolkit”CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” 4 –Scenario 2018Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR) CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 16 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 –Scenario 2018Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 17. Warning!Warning! :: CyberTerrorCyberTerror Travels @Travels @ “Light Speed”“Light Speed” Physical Terror = “Spatial”:Physical Terror = “Spatial”: Attacks on Physical Infrastructure , Corporate Assets, Staff and Citizens *** Sound Waves = 340metres/sec ****** Sound Waves = 340metres/sec *** Cyber Terror = “Temporal”:Cyber Terror = “Temporal”: Anonymous Attacks on, Network Hubs, Servers, Databases & Social Media *** Light Waves = 300,000,000 metres/sec ****** Light Waves = 300,000,000 metres/sec *** 17 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Thrust SSC:Thrust SSC: -- 11stst Supersonic Car: 1995Supersonic Car: 1995--19971997 Web Archive:Web Archive: www.thrustssc.comwww.thrustssc.com
  • 18. 7 Year7 Year CyberVision:CyberVision: “The New Toolkit”“The New Toolkit” • During the last 7 Years CyberThreatsCyberThreats targeted: –– Critical National Infrastructure (CNI):Critical National Infrastructure (CNI): Energy, Banks, Transport, Government, Healthcare, Education... –– Major Events:Major Events: Sports, Elections & Culture Festivals... –– CriminalCriminal eCommerceeCommerce: “The Dark Web” & “SilkRoad”! • The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time” 18 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • The “New Cyber Toolkit”“New Cyber Toolkit” provides “Real-Time” Defence against “Zero“Zero--Day”Day” & “Insider”“Insider” Attacks! • Exponential Increase in Device Connections (IoT) requires Cyber DefenceCyber Defence through AI/MLAI/ML “Bots”“Bots” running 24/7 on ALL Networked System Assets!
  • 19. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 19 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 20. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 33 –– CyberSecurity:CyberSecurity: 21stC Neural Defence21stC Neural Defence 4 –Scenario 2018:Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR) CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 20 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 –Scenario 2018:Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Intelligent”“Intelligent” 6 –Scenario 2025:Scenario 2025: - Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 21. CyberSecurity:CyberSecurity: “21stC Neural Defence”“21stC Neural Defence” •• “Bad Guys”“Bad Guys” are already deploying Advanced CyberTools within Organised Crime SyndicatesOrganised Crime Syndicates! •• Legacy IoT DevicesLegacy IoT Devices in EVERY SectorEVERY Sector may be “hacked” & exploited with ease by “BotNets”!“BotNets”! •• CyberDefenceCyberDefence for Business & Government requires Managed 7 Year Transition to “Speed of Light”“Speed of Light” 21 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Managed 7 Year Transition to “Speed of Light”“Speed of Light” ““Neural Defence”Neural Defence” and “Augmented Reality”Augmented Reality”! ...We now...We now createcreate && exploreexplore CyberSecurity VisionsCyberSecurity Visions for:for: 20182018 (Integrated),(Integrated), 20202020 (Adaptive)(Adaptive) andand 20252025 (Neural)(Neural)
  • 22. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 22 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!” SciSci--Fi MovieFi Movie –– “13“13thth Floor” (1999): “Floor” (1999): “RealReal--WorldWorld && Cyber World”Cyber World”
  • 23. Transition fromTransition from “Cyber Now“Cyber Now -- 20172017”” toto “Intelligent AI/ML Cyber“Intelligent AI/ML Cyber -- 20252025”” 20172017 -- “Cyber Now”“Cyber Now” •• “Signature” Detection“Signature” Detection •• MultiMulti--DMZ FirewallsDMZ Firewalls •• AntiAnti--Virus & MalwareVirus & Malware •• Supervised LearningSupervised Learning 20252025 -- AI/ML CyberAI/ML Cyber •• Behaviour ModellingBehaviour Modelling •• Learning the BaselineLearning the Baseline •• “Smart Security”“Smart Security” •• Unsupervised LearningUnsupervised Learning 23 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Supervised LearningSupervised Learning •• ZeroZero--Day AttacksDay Attacks •• Objects & AssetsObjects & Assets •• “Known BAD!”“Known BAD!” •• Unsupervised LearningUnsupervised Learning •• ZeroZero--Second AttacksSecond Attacks •• Events & ExperienceEvents & Experience •• “Known GOOD!”“Known GOOD!” ScenarioScenario 2025:2025: Defence InDefence In--DepthDepth requires Augmentation ofrequires Augmentation of Traditional “ Cyber” ToolsTraditional “ Cyber” Tools to includeto include Intelligent AI/ML Security ToolsIntelligent AI/ML Security Tools that modelthat model BOTHBOTH “Known GOOD & BAD!”“Known GOOD & BAD!”
  • 24. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 – 7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” 44 ––Scenario 2018:Scenario 2018: Cyber Tools TransitionCyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 –Scenario 2025:Scenario 2025: -Augmented Reality(AR) CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 24 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference24 44 ––Scenario 2018:Scenario 2018: Cyber Tools TransitionCyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 6 –Scenario 2025:Scenario 2025: -Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 25. Scenario 2018:Scenario 2018: “Cyber Tools Transition”“Cyber Tools Transition” *** Integrated ****** Integrated *** • Major Trends & Developments: Scenario 2018Scenario 2018: –– C$O led IntegrationC$O led Integration of Physical and Cyber Security Assets across Corporate Business and Government : CCTV, ANPR, Access Control, Cyber Defence & Alerts 25 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference –– Adaptive AI/MLAdaptive AI/ML Solutions launched by Major Cyber Vendors alongside Cylance, Darktrace & Deep Instinct – Increased National Government PriorityNational Government Priority & Investment in fighting Organised CyberCrime and CyberTerrorism ...”Cyber”...”Cyber” goes “TOP Agenda”“TOP Agenda” in Scenario 2018Scenario 2018!
  • 26. Integration ofIntegration of Physical and CybersecurityPhysical and Cybersecurity Integrated CSOIntegrated CSO--led Management Teamled Management Team –– Merged HQ OperationsMerged HQ Operations Physical Security OperationsPhysical Security Operations Cyber Security OperationsCyber Security Operations Smart SecuritySmart Security == Virtual IntegrationVirtual Integration SharedShared AlertsAlerts 26 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Corporate CSOCorporate CSO--led Security Teamled Security Team ONEONE –– Shopping List!Shopping List! Integrated Management,Integrated Management, Training, Standards, PlansTraining, Standards, Plans ONEONE –– Architecture!Architecture! Smart SecuritySmart Security == Virtual IntegrationVirtual Integration FinalFinal phase ofphase of CyberCyber--Physical IntegrationPhysical Integration -- Embedded Intelligence inEmbedded Intelligence in ALLALL DevicesDevices -- Internet of ThingsInternet of Things
  • 27. “Smart Security”“Smart Security” == CyberCyber ++ PSIMPSIM ++ SIEMSIEM •• Cyber:Cyber: Spans ALL ICTALL ICT Networks, Servers & Devices •• PSIM:PSIM: PPhysical SSecurity IIntegration MManagement •• SIEM:SIEM: SSecurity IInformation & EEvent MManagement 27 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Image:Image: AventuraCCTV.com/PSIMAventuraCCTV.com/PSIM : New York, USA: New York, USA
  • 28. 20172017--2025:2025: Migration fromMigration from IPv4IPv4 toto IPv6IPv6 28 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 2020ththCC – 1st Gen: IPv4: IPv4 –– 223232 = 109+ Devices (IP Address Space almost fully assigned) 2121ststCC – 2nd Gen:: IPv6IPv6 –– 22128128 = 1038+ Devices (Networking “Internet of Things – IoT”) -- Expanded IP Address Space forExpanded IP Address Space for “IoT”“IoT” sets newsets new “Cybersecurity Challenges”“Cybersecurity Challenges”!! --
  • 29. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 29 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference29 4 –Scenario 2018:Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 55 ––ScenarioScenario 2020:2020: AI & Machine LearningAI & Machine Learning ““Adaptive”Adaptive” 6 –Scenario 2025:Scenario 2025: Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 30. Scenario 2020Scenario 2020: “AI & Machine Learning”: “AI & Machine Learning” *** Adaptive ****** Adaptive *** • Major Trends and Developments: Scenario 2020Scenario 2020 –– ALL Major Cyber VendorsALL Major Cyber Vendors market AI/ML Solutions – Updated ISO/NISTISO/NIST Standards with Adaptive Security – Embedded “Cyber” in ALL New Smart IoTSmart IoT Devices – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO 30 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference – Board Level C$O in CC$O in C--SuitesSuites with CEO, CFO & COO – International Protocols on Cyber WarfareCyber Warfare (UN/NATO)(UN/NATO) .....CyberSecurityCyberSecurity now focused on SelfSelf--AdaptiveAdaptive Modelling of “Normal” Net/User Behaviour & Detection of RealReal--Time Anomalies & ThreatsTime Anomalies & Threats!
  • 31. SelfSelf--Organisation:Organisation: Cellular AutomatonCellular Automaton ****** Emergence of Patterns from Random Chaos ***Emergence of Patterns from Random Chaos *** 31 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 32. “Smart”“Smart” AutonomousAutonomous Chemical Oscillator:Chemical Oscillator: ****** BelousovBelousov––Zhabotinsky Reaction (BZ) ***Zhabotinsky Reaction (BZ) *** 32 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 33. “Smart Scaling”:“Smart Scaling”: Fractal Mandelbrot SetFractal Mandelbrot Set 33 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 34. 34 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference CarnaCarna BotnetBotnet exposed Legacyexposed Legacy Vulnerabilities inVulnerabilities in “IoT” Devices“IoT” Devices
  • 35. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT” 35 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 36. EUEU “IoT”“IoT” Programme Visions forProgramme Visions for 20152015 andand 20202020 36 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 37. IERCIERC –– Research Cluster Reports onResearch Cluster Reports on ““Smart Systems” & the Internet of ThingsSmart Systems” & the Internet of Things 37 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 38. MultiMulti--Year Evolution of WikiYear Evolution of Wiki--WebWeb Complex Adaptive System : “Wiki.tudelft.nl”Complex Adaptive System : “Wiki.tudelft.nl” 38 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
  • 39. CyberCyber 20202020 Visions:Visions: Booz, Allen & HamiltonBooz, Allen & Hamilton and The Australian Government (Defence)and The Australian Government (Defence) 39 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 40. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 40 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 41. Darktrace:Darktrace: AI/ML CyberSecurityAI/ML CyberSecurity -- The Enterprise Immune SystemThe Enterprise Immune System -- www.darktrace.comwww.darktrace.com 41 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference DarkTraceDarkTrace:: CyberSecurity SolutionCyberSecurity Solution thatthat “Learns”“Learns” ALL Net Traffic, Assets & User Behaviour...ALL Net Traffic, Assets & User Behaviour... ...Real...Real--time Alertstime Alerts provided &provided & Assets QuarantinedAssets Quarantined wheneverwhenever “Non“Non--Normal”Normal” Events Detected!Events Detected!
  • 42. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 42 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
  • 43. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 43 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat ***
  • 44. DeepDeepInstinctInstinct:: RealReal--Time APT ProtectionTime APT Protection 44 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ProvidesProvides Deep Learning CyberSecurityDeep Learning CyberSecurity forfor APT ProtectionAPT Protection ofof MobileMobile && EndEnd--PointsPoints!! --****** APTAPT = Advanced Persistent Threat ***= Advanced Persistent Threat *** www.www.deepdeepinstinct.cominstinct.com
  • 45. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 45 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ******
  • 46. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 46 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!
  • 47. Google I/O:Google I/O: AI/ML FuturesAI/ML Futures –– 1717thth May 2017May 2017 47 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Ultra High SpeedUltra High Speed –– Tensor Processing Unit:Tensor Processing Unit: TPUTPU ****** AL/ML/Big Data AppsAL/ML/Big Data Apps -- 180180 TeraFlopsTeraFlops ****** “Integrated Intelligent CyberSecurity”“Integrated Intelligent CyberSecurity” usingusing Google TPUGoogle TPU withinwithin 5 Years5 Years runningrunning UltraUltra--Fast RealFast Real--TimeTime AI/ML/Big Data!AI/ML/Big Data!GoogleGoogle Machine Learning Research CentreMachine Learning Research Centre:: ZurichZurich -- 20162016
  • 48. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 48 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 49. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 49 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 50. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 50 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
  • 51. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 51 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Scenario 2018:Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 66 –– Scenario 2025:Scenario 2025: Augmented Reality(AR)Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 52. ScenarioScenario 2025+2025+:: “Augmented Reality”“Augmented Reality” *** Neural Security ****** Neural Security *** • Major Trends and Developments: Scenario 2025Scenario 2025 - Enterprises now deploy AI/MLAI/ML Based CyberSecurity ToolsCyberSecurity Tools -- “Augmented Reality”“Augmented Reality” Cyber Software & Smart DevicesSmart Devices -- C$OsC$Os provide Pan-Enterprise Physical/Cyber SecurityPhysical/Cyber Security -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security 52 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference -- ICT NetworksICT Networks migrate to SelfSelf--Learning Neural SecurityLearning Neural Security - Intelligent “AI Bots”“AI Bots” act a Real-Time “Cyber Police”“Cyber Police” to Search & Quarantine Resources linked with suspected CyberCriminals, Political HacktivistsCyberCriminals, Political Hacktivists & CyberTerrorCyberTerror CellsCells! ....Business & Government CyberCyber Networks & Assets now Secured 24/7 through “Intelligent AI/ML Bots”Intelligent AI/ML Bots”
  • 53. ScenarioScenario 2025+2025+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 53 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 54. ScenarioScenario 2025+2025+:: “Neural Security”“Neural Security” • Full Implementation of Intelligent & Adaptive Cybersecurity across the Extended EnterpriseExtended Enterprise •• Autonomous “Alerts”Autonomous “Alerts” and Real-Time AI/ML-based Cyber Event, Traffic & User Modelling • New Scaled Architectures and Operational Standards 54 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • New Scaled Architectures and Operational Standards for “Smart Systems”“Smart Systems” – Smart Devices, Business, Cities, Government, Economy & Society • Cybersecurity Operations transition to become Ultra-Intelligent – “Neural Security”“Neural Security” – through Embedded “AI-Security Bots” for Real-Time Defence
  • 55. Artificial Neural NetworksArtificial Neural Networks applied toapplied to RealReal--Time Foreign Exchange DealingTime Foreign Exchange Dealing 55 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Algorithmic Computer Trading usingAlgorithmic Computer Trading using RealReal--Time Neural NetsTime Neural Nets & Statistical Maths Tools have been used for& Statistical Maths Tools have been used for 25+25+ Years!Years! .....Now they are being applied to provide intelligent.....Now they are being applied to provide intelligent realreal--time forecasts for enterprisetime forecasts for enterprise cybersecuritycybersecurity threats!threats!
  • 56. Worldwide RealWorldwide Real--Time Financial TradingTime Financial Trading @@Light SpeedLight Speed –– 24/724/7 –– Global NetworksGlobal Networks 56 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 57. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 57 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 58. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 58 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.nvidia.comwww.nvidia.com
  • 59. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 59 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 60. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 60 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 61. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 61 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 62. Deep Learning & Neural NetworksDeep Learning & Neural Networks AdvancedAdvanced CyberSecurityCyberSecurity SolutionsSolutions 62 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.cylance.comwww.cylance.com/content/dam/cylance/pdfs/white_papers//content/dam/cylance/pdfs/white_papers/AI_and_Machine_Learning.pdfAI_and_Machine_Learning.pdf
  • 63. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 63 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 64. Mapping 21Mapping 21ststC Social Media Networks:C Social Media Networks: LinkedIn (Probert)LinkedIn (Probert) 64 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 65. Hyperglance:Hyperglance:SmartSmart 3D Network Modelling3D Network Modelling 65 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Hyperglance RealHyperglance Real--Time Visualisation Software: RealTime Visualisation Software: Real--Status.comStatus.com -- London, UKLondon, UK
  • 66. TypicalTypical “Machine Learning”“Machine Learning” AlgorithmAlgorithm 66 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 67. “Smart Glass”:“Smart Glass”: Augmented RealityAugmented Reality -- Meta VisionMeta Vision ARAR HeadSetHeadSet:: 20172017 -- 67 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 68. Augmented Reality:Augmented Reality: “Skiing Challenge”“Skiing Challenge” 68 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 69. Augmented RealityAugmented Reality –– ““Location Paris”Location Paris” 69 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 70. Technology Visions:Technology Visions: ScenarioScenario 20252025 70 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference CISCOCISCO:: 20252025 Scenarios:Scenarios: IDATEIDATE
  • 71. CyberspaceCyberspace 20252025:: Microsoft ScenariosMicrosoft Scenarios *** Plateau*** Plateau –– PeakPeak –– Canyon ***Canyon *** 71 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 72. BBC WorldwideBBC Worldwide Internet Scenario:Internet Scenario: 20402040 72 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 73. ScenarioScenario 20402040: Cyber Defence:: Cyber Defence: UK Ministry of DefenceUK Ministry of Defence -- MODMOD 73 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 74. ScenarioScenario 20402040: Cyber: Cyber DefenseDefense –– NATO & CanadaNATO & Canada 74 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 75. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 75 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Scenario 2018:Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) “Neural Security”“Neural Security” 77 –– “Interfacing Human and Cyber Worlds”“Interfacing Human and Cyber Worlds” 8 – From 7 Year7 Year CyberVision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 76. InterfacingInterfacing “Human”“Human” andand ““CyberWorldsCyberWorlds”” •• Neural AI/MLNeural AI/ML CyberSecurityCyberSecurity Solutions will require enhanced Intelligent Human/Machine Interfaces! • Human Communications run @ Sound Speed....@ Sound Speed.... whilst Cyber Worlds run 11 MillionMillion XX faster @ Speed of Light!..@ Speed of Light!.. •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & 76 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Virtual, Mixed & Augmented Reality(AR)Virtual, Mixed & Augmented Reality(AR) Devices & Software(SW) will “Bridge” Human & Cyber Worlds! ....Expect New Generation AR DeNew Generation AR Devices & SW Interfaces for Security Management during the next 7 Years!....7 Years!....
  • 77. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 77 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
  • 78. TheThe CybersecurityCybersecurity Industry 10 Year Challenge:Industry 10 Year Challenge: -- Apply AI Apps for RealApply AI Apps for Real--Time Cyber DefenceTime Cyber Defence -- 78 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference DeployDeploy LightLight--SpeedSpeed “AI“AI--Neural Security”Neural Security” against 24/7 Attacks fromagainst 24/7 Attacks from ““Bad GuysBad Guys””
  • 79. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” 4 – Scenario 2018Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 79 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Scenario 2018Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 88 –– FromFrom 7 Year7 Year Cyber Vision to Reality!Cyber Vision to Reality! 9 – YOURYOUR Action Plan for 21stC Cyber!...
  • 80. “From“From 77 YearYear CyberVisionCyberVision toto RealityReality!”!” • 7 Year Evolution of Business “$“$ecurityecurity Culture”Culture” •• Cyber RoadMapCyber RoadMap managed by Board-Level C$O • Integrated Security with Intelligent AI Alerts!Intelligent AI Alerts! • Professional Cyber TrainingCyber Training for EVERY Business •• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff” 80 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• “Sell”“Sell” Security Policy & Culture to ALL “Staff”“Staff” •• Trial and DeployTrial and Deploy Adaptive AI Security Solutions .....CyberSecurityCyberSecurity now requires $$$$$$ Investment in Teams & Technology to Mitigate Major Risks!...Mitigate Major Risks!...
  • 81. UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021 DefendDefend –– DeterDeter -- DevelopDevelop 81 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016 DefendDefend –– DeterDeter -- DevelopDevelop
  • 82. Smart City:Smart City: MultiMulti--Layered ArchitectureLayered Architecture 82 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 83. Smart City:Smart City: MultiMulti--Layer Security FrameworkLayer Security Framework 83 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 84. MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG 84 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 85. CyberTerrorismCyberTerrorism @ World Counter Terror@ World Counter Terror CongressCongress –– Olympia, LondonOlympia, London –– April 2017April 2017 85 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 86. 1 – “CyberSecurity @ Board Level”“CyberSecurity @ Board Level” 2 –7 Year7 Year CyberVision: “The New Toolkit” 3 – CyberSecurity: “21stC Neural Defence” 4 – Scenario 2018:Scenario 2018: Cyber Tools Transition 5 –Scenario 2020:Scenario 2020: AI & Machine Learning 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) CyberSecurity Tools and Trends:CyberSecurity Tools and Trends: 20182018––20252025 86 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Scenario 2018:Scenario 2018: Cyber Tools Transition “Integrated”“Integrated” 5 –Scenario 2020:Scenario 2020: AI & Machine Learning “Adaptive”“Adaptive” 6 – Scenario 2025:Scenario 2025: Augmented Reality(AR) “Neural Security”“Neural Security” 7 – ”Interfacing Human & Cyber Worlds“ 8 – From 7 Year7 Year CyberVision to Reality! 99 –– YOURYOUR Action Plan for 21stC Cyber!...Action Plan for 21stC Cyber!...
  • 87. YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!... • Every CSO needs Board-Level Approval for Annual Security Business Plan that includes CyberSecurity • YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include: –– Investment BudgetInvestment Budget for Integrated Security Solutions –– Job SpecificationsJob Specifications for Professional “Cyber” Team 87 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Job SpecificationsJob Specifications for Professional “Cyber” Team –– Security Staff TrainingSecurity Staff Training & Professional Development –– Technical & OperationalTechnical & Operational Plans & Upgrades –– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards .....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
  • 88. “Cyber Defence”“Cyber Defence” againstagainst “Organised Crime”“Organised Crime” Adaptive SecurityAdaptive Security providesprovides Intelligent Cyber DefenceIntelligent Cyber Defence againstagainst 21stC21stC Cyber CrimeCyber Crime!! 88 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference “Plan“Plan YOURYOUR CybersecurityCybersecurity Defence CampaignDefence Campaign NOWNOW!”!” Bulgakov’s Devil Cat – БегемотБегемот - Master & Margarita - 1972 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
  • 89. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 89 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 90. The Final Countdown!:The Final Countdown!: CyberTerrorCyberTerror StrikesStrikes @@ “Light Speed”“Light Speed” across Global Networks!across Global Networks! 90 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 91. “CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025 International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa “CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025 International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa 91 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
  • 92. “CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025 International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa “CyberSecurity Tools and Trends”:“CyberSecurity Tools and Trends”: 20182018--20252025 International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa ThankThank--You!You!ThankThank--You!You! 92 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
  • 93. EastEast--West Security ConferenceWest Security Conference –– Genoa 2017Genoa 2017 --“21stC CyberSecurity Trends”“21stC CyberSecurity Trends”-- 93 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download Link:Download Link: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/ Theme (1)Theme (1) ––“TOP 10 Cyber Threats”“TOP 10 Cyber Threats” Theme (2)Theme (2) ––““CyberTrendsCyberTrends: 2018: 2018--2025”2025”
  • 94. Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ 94 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 95. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 95 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 96. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 96 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 97. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 97 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download:Download: www.valentina.net/DigiTec2012/
  • 98. “CyberSecurity Trends & Tools”:“CyberSecurity Trends & Tools”: 20182018––2025!2025! 3535thth International EastInternational East--West Security Conference: Genoa, ItalyWest Security Conference: Genoa, Italy 98 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 99. “Surfing the Evolutionary“Surfing the Evolutionary Cyber Waves”Cyber Waves” -- More than 45 Years45 Years of AI & CyberSecurityAI & CyberSecurity! - • 1970 – BT Research Labs – IBM 360 –Digital PCM • 1976 – AI Thesis – Stochastic Learning Automata • 1982 – AI & Expert Systems: UK Govt Programme • 1991 – EARN/TERENA: European Networks Board • 1992 – International Net Conference: RAS, Moscow • 1994 – EMEA – Internet, Security & eCommerce 99 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • 1994 – EMEA – Internet, Security & eCommerce • 2007 – Georgian Parliament Security Projects • 2009 – Armenia eGovernance & CyberSecurity • 2010 – Georgian Cybersecurity Audit & Roadmap ......Global Marketplace for......Global Marketplace for ”Cyber” AI/ML Apps”Cyber” AI/ML Apps willwill mainstream during themainstream during the Next 7 Years: 2018Next 7 Years: 2018 –– 20152015 !!
  • 100. BT Research Labs:BT Research Labs: Digital SystemsDigital Systems--19701970 100 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download:Download: www.slideshare.net/DrDavidProbert/dep1970pcmwww.slideshare.net/DrDavidProbert/dep1970pcm
  • 101. -- Dept of Mathematics & StatisticsDept of Mathematics & Statistics -- Cambridge UniversityCambridge University :: 19731973 -- 19761976 101 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference David ProbertDavid Probert
  • 102. Evolution of Stochastic AutomataEvolution of Stochastic Automata –– Cambridge, June ‘76Cambridge, June ‘76 The Evolution ofThe Evolution of Stochastic AutomataStochastic Automata David Eric ProbertDavid Eric Probert -- 19761976 102 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download :Download : www.valentina.net/Thesis/Thesis.pdfwww.valentina.net/Thesis/Thesis.pdf SelfSelf--Organisation & AdaptationOrganisation & Adaptation Of Stochastic Learning AutomataOf Stochastic Learning Automata To Dynamic EnvironmentsTo Dynamic Environments David Eric ProbertDavid Eric Probert -- 19761976 Churchill College, CambridgeChurchill College, Cambridge
  • 103. Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC 103 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference From:From: “Business Blueprint”:“Business Blueprint”: ProbertProbert –– July 1989July 1989
  • 104. 2525thth Anniversary:Anniversary: “KolaNet”“KolaNet” -- Nuclear SecurityNuclear Security 104 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference KolaNetKolaNet Project:Project: 1992 to 19971992 to 1997 –– Kola PeninsulaKola Peninsula –– Russian ArcticRussian Arctic
  • 105. Control RoomControl Room -- Kola Nuclear Power StationKola Nuclear Power Station -- RussiaRussia 105 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Kola Nuclear Power Main Control
  • 106. KolaNetKolaNet Project forProject for Nuclear SecurityNuclear Security ::19921992--19971997 106 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 107. ““Human AdaptationHuman Adaptation in thein the ArcticArctic”” * Kola Science Centre :* Kola Science Centre : ApatityApatity, Russia, Russia ** Launched:Launched: 20162016 107 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference R&D Centre forR&D Centre for Human AdaptationHuman Adaptation in thein the ArcticArctic -- Kola ScienceKola Science Centre:Centre:medbioarctic.rumedbioarctic.ru *Researching Human*Researching Human HealthHealth,, SafetySafety && SecuritySecurity in Extreme Arctic Environments*in Extreme Arctic Environments*
  • 108. Protecting Ukraine & Georgian ParliamentsProtecting Ukraine & Georgian Parliaments -- Integrated Cyber and Physical SecurityIntegrated Cyber and Physical Security -- 108 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Internet, Web Sites, & IT Security Programmes initiated 1994Internet, Web Sites, & IT Security Programmes initiated 1994 Ukraine ParliamentUkraine Parliament :: KyivKyiv Georgian Parliament:Georgian Parliament: TbilisiTbilisi
  • 109. Project Team:Project Team: Almaty, KazakhstanAlmaty, Kazakhstan -- 19951995 109 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 110. Cybersecurity forCybersecurity for Georgian Parliament:Georgian Parliament: 20072007 -- 20102010 110 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ...Critical Infrastructure Review & RoadMap:...Critical Infrastructure Review & RoadMap: UN/ITU CybersecurityUN/ITU Cybersecurity –– Georgian GovernmentGeorgian Government
  • 111. Cybersecurity forCybersecurity for ArmeniaArmenia andand GeorgiaGeorgia 111 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Link:Link: www.valentina.net/vaza/CyberDocs/www.valentina.net/vaza/CyberDocs/
  • 112. Cybersecurity &Cybersecurity & eGoveGov Missions:Missions: 20092009--20122012 **Mt AragatsMt Aragats –– South Summit(3879m):South Summit(3879m): ArmeniaArmenia** 112 -- CyberSecurity Tools and TrendsCyberSecurity Tools and Trends -- “From 2018 to 2025 and Beyond! ”“From 2018 to 2025 and Beyond! ” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference