2. ME
Co-founder -> Cyber Security Hub – Barcelona
Founder and VP Engineering -> Innovating: Crime and
fraud detection/prevention platform
Managing Director -> Helping to find the most disruptive
Cyber Security startups
Carlos Valderrama
Over 15 years in Cyber Security, Computer
Forensics and Cyber Intelligence
6. ATMs, POS, Banking Trojans, contactless pickpockets,
etc, etc, etc.
CURRENT SITUATION
7. It’s clear that the security procedures utilized by companies today (big and small) is
completely failing and with the huge growth of IoT products (from smart fridges to
Barbie dolls) of which many are buggy from the factory, criminals are not
only compromising our data but also that of our family
CURRENT SITUATION
10. CURRENT SITUATION
Air traffic control systems, railways, power stations, water plants, cars, etc, etc.
Terrorism
11. Cyber terrorism
CURRENT SITUATION
“Premeditated, politically motivated attack against information, computer systems,
computer programs, and data which results in violence against non-combatant
targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of Investigation
12. Crypto War 2.0 - Apple Case
CURRENT SITUATION
We have great respect for the professionals at the FBI, and we believe their intentions
are good. Up to this point, we have done everything that is both within our power and
within the law to help them. But now the U.S. government has asked us for something
we simply do not have, and something we consider too dangerous to create. They
have asked us to build a backdoor to the iPhone.
17. CURRENT MODEL
• Complexity is the enemy of security
• Complexity is expensive
• Simplicity is the ultimate sophistication – Leonardo Davinci
• Simplicity is the complexity resolved – Constantin Brancusi
19. CYBER SECURITY DISRUPTION
You know the Cyber Security Disruption is not happening when…
• Telco providers
• Power plants
• Banks
• Computers
• Smartphones
• Pacemakers
• Email providers
• Browsers
• Operating Systems
• Social Networks
• Cars
• Drones
• …
Everyone and everything is getting
hacked!
We can’t detect it and prevent it
>
>
21. CYBER SECURITY
Companies
Corporate network,
corporate servers and
computers, Internet Services,
Internet of Things, Online
Banking, BYOD, Online
Services
Citizens
Internet of Things, Personal
computers, Online services,
Cars, Smart city technology,
Mobile phones, Apps,
Internet Services, Online
Banking, Drones
Government
Government network,
Government servers and
computers, Government
data, Public records,
eGovernment, Online
services, International affairs
Public
Infrastructure
Critical infrastructure, smart
cities, Cars, Internet of
Things and connected
devices, traffic lights,
Security Cameras, Public
transport infrastructure
CYBER SECURITY
23. WHY CYBER SECURTIY?
“In 2014 venture capitalists
invested a record amount in
privately held companies in the
Cyber Security industry“
“In 2014, companies reported
42.8 million detected attacks
worldwide, a 48% YoY increase”
“The Cyber Security
Market will be worth
$170.21 Billion by 2020”
“$3.3 billion invested in Cyber
Security by VCs in 2015 – VCs
chasing Rising Cyber Security
Spending”
“Cyber Security startup
Tanium raising new VC at $2.5
billion valuation”
“Investors are pouring billions
into Cyber Security firms”
24. THE MOVERS & SHAKERS
Some of the leading European startups making a change in the
Cyber Security sector
Makers of the
Blackphone. Silent Circle
provides multiplatform
secure communication
services for mobile
devices and desktop
Develops continuous
authentication and
verification technology
that provides identity
and access
management solutions
The easy browser
extension that hides
your IP address,
encrypts your traffic and
protects your privacy
Scytl develops secure
electronic voting and
electoral modernization
solutions for the public
and private sectors
Telegram is a cloud-
based instant messaging
service.
Telegram messages are
heavily encrypted and
can self-destruct
The world leader in
Enterprise Immune
System technology for
cyber security
Silobreaker is a data
analytics company
specialising in cyber
security and risk
intelligence.
Provides cyber
situational awareness
that helps organizations
protect against cyber
attacks and loss of
intellectual property
29. SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber
security across the U.S. government, an increase of $5 billion over this year
(REUTERS)