SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
CYBER SECURITY
INNOVATION
AN URGENT CALL FOR
CYBER HEROS
ME
Co-founder -> Cyber Security Hub – Barcelona
Founder and VP Engineering -> Innovating: Crime and
fraud detection/prevention platform
Managing Director -> Helping to find the most disruptive
Cyber Security startups
Carlos Valderrama
Over 15 years in Cyber Security, Computer
Forensics and Cyber Intelligence
CURRENT SITUATION
What’s happening out there?
Cyber Security Incidents reported to the U.S. CERT
CURRENT SITUATION
CURRENT SITUATION
ATMs, POS, Banking Trojans, contactless pickpockets,
etc, etc, etc.
CURRENT SITUATION
It’s clear that the security procedures utilized by companies today (big and small) is
completely failing and with the huge growth of IoT products (from smart fridges to
Barbie dolls) of which many are  buggy from the factory,  criminals are not
only compromising our data but also that of our family
CURRENT SITUATION
IoT devices
CURRENT SITUATION
•  Marketing
•  State-sponsored
•  Competitiveness
•  Crime/Terrorism
Privacy and Cyber Espionage
CURRENT SITUATION
CURRENT SITUATION
Air traffic control systems, railways, power stations, water plants, cars, etc, etc.
Terrorism
Cyber terrorism
CURRENT SITUATION
“Premeditated, politically motivated attack against information, computer systems,
computer programs, and data which results in violence against non-combatant
targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of Investigation
Crypto War 2.0 - Apple Case
CURRENT SITUATION
We have great respect for the professionals at the FBI, and we believe their intentions
are good. Up to this point, we have done everything that is both within our power and
within the law to help them. But now the U.S. government has asked us for something
we simply do not have, and something we consider too dangerous to create. They
have asked us to build a backdoor to the iPhone.
REAL TIME ATTACKS
The battle
CURRENT SITUATION
Why are the bad guys winning?
CURRENT SITUATION
CURRENT MODEL
New challenges, old methods
CURRENT MODEL
•  Complexity is the enemy of security
•  Complexity is expensive
•  Simplicity is the ultimate sophistication – Leonardo Davinci
•  Simplicity is the complexity resolved – Constantin Brancusi
CYBER SECURITY DISRUPTION
Digital disruption
CYBER SECURITY DISRUPTION
You know the Cyber Security Disruption is not happening when…
•  Telco providers
•  Power plants
•  Banks
•  Computers
•  Smartphones
•  Pacemakers
•  Email providers
•  Browsers
•  Operating Systems
•  Social Networks
•  Cars
•  Drones
•  …
Everyone and everything is getting
hacked!
We can’t detect it and prevent it
>
>
CYBER SECURITY
Innovation is the answer
CYBER SECURITY
Companies
Corporate network,
corporate servers and
computers, Internet Services,
Internet of Things, Online
Banking, BYOD, Online
Services
Citizens
Internet of Things, Personal
computers, Online services,
Cars, Smart city technology,
Mobile phones, Apps,
Internet Services, Online
Banking, Drones
Government
Government network,
Government servers and
computers, Government
data, Public records,
eGovernment, Online
services, International affairs
Public
Infrastructure
Critical infrastructure, smart
cities, Cars, Internet of
Things and connected
devices, traffic lights,
Security Cameras, Public
transport infrastructure
CYBER SECURITY
THE MARKET
Cyber Security
WHY CYBER SECURTIY?
“In 2014 venture capitalists
invested a record amount in
privately held companies in the
Cyber Security industry“
“In 2014, companies reported
42.8 million detected attacks
worldwide, a 48% YoY increase”
“The Cyber Security
Market will be worth
$170.21 Billion by 2020”
“$3.3 billion invested in Cyber
Security by VCs in 2015 – VCs
chasing Rising Cyber Security
Spending”
“Cyber Security startup
Tanium raising new VC at $2.5
billion valuation”
“Investors are pouring billions
into Cyber Security firms”
THE MOVERS & SHAKERS
Some of the leading European startups making a change in the
Cyber Security sector
Makers of the
Blackphone. Silent Circle
provides multiplatform
secure communication
services for mobile
devices and desktop
Develops continuous
authentication and
verification technology
that provides identity
and access
management solutions
The easy browser
extension that hides
your IP address,
encrypts your traffic and
protects your privacy	
Scytl develops secure
electronic voting and
electoral modernization
solutions for the public
and private sectors
Telegram is a cloud-
based instant messaging
service.
Telegram messages are
heavily encrypted and
can self-destruct
The world leader in
Enterprise Immune
System technology for
cyber security
Silobreaker is a data
analytics company
specialising in cyber
security and risk
intelligence.
Provides cyber
situational awareness
that helps organizations
protect against cyber
attacks and loss of
intellectual property
THE MAP
For more detail, the table can be found here.
BIG CYBER SECURITY EXITS
INVESTMENT HISTORY
INVESTMENT HISTORY
SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber
security across the U.S. government, an increase of $5 billion over this year
(REUTERS)
THE NECESSITY
Players
THE BIG PICTURE
University/Education
Government
Niche Investors/
Accelerators
Startups
Corporations
Cyber Security
Community
Women
Men
CYBER HEROES NEEDED
Lean startup Fellow founders
Funding Legal
Sales
Marketing/Growth
Hacking
Cyber Security Operations
CYBER HEROES NEEDED
JOIN US
We want you!
THANK YOU!
carlos@hackcradle.com

Mais conteúdo relacionado

Mais procurados

Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard ProjectNarudom Roongsiriwong, CISSP
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...Edureka!
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 

Mais procurados (20)

Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard Project
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 

Destaque

Infosecurity russia 2015
Infosecurity russia 2015Infosecurity russia 2015
Infosecurity russia 2015Sergey Khodakov
 
Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015Sergey Khodakov
 
Skolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentationSkolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentationSergey Khodakov
 
Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016Sergey Khodakov
 
Creating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovoCreating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovoSergey Khodakov
 
Skolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_execSkolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_execSergey Khodakov
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 

Destaque (10)

Infosecurity russia 2015
Infosecurity russia 2015Infosecurity russia 2015
Infosecurity russia 2015
 
Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015Кластер ИТ Сколково - итоги первого полугодия 2015
Кластер ИТ Сколково - итоги первого полугодия 2015
 
Skolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentationSkolkovo IT Cluster startup tour presentation
Skolkovo IT Cluster startup tour presentation
 
Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016Startups in cybersecurity - CISO Forum, April 18, 2016
Startups in cybersecurity - CISO Forum, April 18, 2016
 
Creating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovoCreating cybersecurity solutions in skolkovo
Creating cybersecurity solutions in skolkovo
 
Skolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_execSkolkovo cybersecurity jan_2016_ev_exec
Skolkovo cybersecurity jan_2016_ev_exec
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 

Semelhante a [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM

Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....zayadeen2003
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech SimplifiediHashmi ...
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 

Semelhante a [4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM (20)

Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech Simplified
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
188
188188
188
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM

  • 1. CYBER SECURITY INNOVATION AN URGENT CALL FOR CYBER HEROS
  • 2. ME Co-founder -> Cyber Security Hub – Barcelona Founder and VP Engineering -> Innovating: Crime and fraud detection/prevention platform Managing Director -> Helping to find the most disruptive Cyber Security startups Carlos Valderrama Over 15 years in Cyber Security, Computer Forensics and Cyber Intelligence
  • 4. Cyber Security Incidents reported to the U.S. CERT CURRENT SITUATION
  • 6. ATMs, POS, Banking Trojans, contactless pickpockets, etc, etc, etc. CURRENT SITUATION
  • 7. It’s clear that the security procedures utilized by companies today (big and small) is completely failing and with the huge growth of IoT products (from smart fridges to Barbie dolls) of which many are  buggy from the factory,  criminals are not only compromising our data but also that of our family CURRENT SITUATION
  • 9. •  Marketing •  State-sponsored •  Competitiveness •  Crime/Terrorism Privacy and Cyber Espionage CURRENT SITUATION
  • 10. CURRENT SITUATION Air traffic control systems, railways, power stations, water plants, cars, etc, etc. Terrorism
  • 11. Cyber terrorism CURRENT SITUATION “Premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents." U.S. Federal Bureau of Investigation
  • 12. Crypto War 2.0 - Apple Case CURRENT SITUATION We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
  • 15. Why are the bad guys winning? CURRENT SITUATION
  • 17. CURRENT MODEL •  Complexity is the enemy of security •  Complexity is expensive •  Simplicity is the ultimate sophistication – Leonardo Davinci •  Simplicity is the complexity resolved – Constantin Brancusi
  • 19. CYBER SECURITY DISRUPTION You know the Cyber Security Disruption is not happening when… •  Telco providers •  Power plants •  Banks •  Computers •  Smartphones •  Pacemakers •  Email providers •  Browsers •  Operating Systems •  Social Networks •  Cars •  Drones •  … Everyone and everything is getting hacked! We can’t detect it and prevent it > >
  • 21. CYBER SECURITY Companies Corporate network, corporate servers and computers, Internet Services, Internet of Things, Online Banking, BYOD, Online Services Citizens Internet of Things, Personal computers, Online services, Cars, Smart city technology, Mobile phones, Apps, Internet Services, Online Banking, Drones Government Government network, Government servers and computers, Government data, Public records, eGovernment, Online services, International affairs Public Infrastructure Critical infrastructure, smart cities, Cars, Internet of Things and connected devices, traffic lights, Security Cameras, Public transport infrastructure CYBER SECURITY
  • 23. WHY CYBER SECURTIY? “In 2014 venture capitalists invested a record amount in privately held companies in the Cyber Security industry“ “In 2014, companies reported 42.8 million detected attacks worldwide, a 48% YoY increase” “The Cyber Security Market will be worth $170.21 Billion by 2020” “$3.3 billion invested in Cyber Security by VCs in 2015 – VCs chasing Rising Cyber Security Spending” “Cyber Security startup Tanium raising new VC at $2.5 billion valuation” “Investors are pouring billions into Cyber Security firms”
  • 24. THE MOVERS & SHAKERS Some of the leading European startups making a change in the Cyber Security sector Makers of the Blackphone. Silent Circle provides multiplatform secure communication services for mobile devices and desktop Develops continuous authentication and verification technology that provides identity and access management solutions The easy browser extension that hides your IP address, encrypts your traffic and protects your privacy Scytl develops secure electronic voting and electoral modernization solutions for the public and private sectors Telegram is a cloud- based instant messaging service. Telegram messages are heavily encrypted and can self-destruct The world leader in Enterprise Immune System technology for cyber security Silobreaker is a data analytics company specialising in cyber security and risk intelligence. Provides cyber situational awareness that helps organizations protect against cyber attacks and loss of intellectual property
  • 25. THE MAP For more detail, the table can be found here.
  • 29. SPENDING HISTORY In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year (REUTERS)
  • 31. THE BIG PICTURE University/Education Government Niche Investors/ Accelerators Startups Corporations Cyber Security Community Women Men
  • 32. CYBER HEROES NEEDED Lean startup Fellow founders Funding Legal Sales Marketing/Growth Hacking Cyber Security Operations