SlideShare a Scribd company logo
1 of 22
Download to read offline
Cyberterrorism
November, 2020
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past, Present, Future
highly functioning savant
political/corporate advisor, and expert/witness in information security //


focus on the risks of cyber terrorism, and cyber warfare/crime, and their
impact on the security of critical, national/global infrastructure //
cyber incident
fi
rst responder // digital strategy consultant // podcast
host at The Very Best Podcast In The World // blogger // chairman at
The Global Internet Magna Carta Project // etc.
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
The next 30 minutes of your life
1. Past incidents and what they taught us


2. What are the present risks of cyberterrorism


3. What does the future of cyberterrorism look like


4. What can you do to mitigate cyberterrorism risks
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
De
fi
nitions of (cyber-)terrorism
Cyberterrorism is the use of the Internet to conduct violent acts that
result in, or threaten, loss of life or signi
fi
cant bodily harm, in order to
achieve political or ideological gains through threat or intimidation.


Terrorism is the use of International violence for political or religious
purposes. It is used in this regard primarily to refer to violence during
peacetime or in the context of war against non-combatants.
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past
pars pro toto


Stuxnet (Natanz, 2010)


Bangladesh Bank Cyber Heist (Dhaka, 2016)


NotPetya (Global, 2017)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past
Countless, less noteworthy attacks
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past
Only 7 years between targeted attack to attack w/ global fallout
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past
Signi
fi
cant impact & massive collateral damage
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Past
Only assumptions, no convictions
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Present
Politically and organisationally ignored
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Present
(Non-)state actor arms race
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Present
Dire impact on society


(no electricity, no communication, no payment, no critical infrastructure,
no…)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Present
Protection from WHAT?
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Present
The internet hasn’t reached a stage at which


we can mindlessly digitise everything
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Future
Two dimensions: (1) Arms race (2) increasing vulnerability
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Future
Push for “connectedness” > neuralink, wearables, IoT, Industry 4.0, “Great
Reset”, connected driving, unmanned areal vehicles, pilotless sea vessels,
smart grid, etc.
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Future
Exponentially increasing risk > even more vulnerable than we currently are
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Mitigation
(Organisational pressure) for the creation of legislative framework to secure
critical infrastructure (globally)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Mitigation
International agreements beyond NATO’s Tallinn Manual to protect civilian
infrastructure from cyberterrorism & cyberwarfare
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Mitigation
ISO27XXX ain’t gonna save ya ‘cause it’s only REACTIVE!!!!!1


- rather -


Holistic approach > Advanced Cyber Security Risk Assessment Checklist


HTTPS://LARSHILSE.COM/GO/ACRAC
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
The past 30 minutes of your life
1. Past incidents increased in number & fallout


2. Attacks today would have severe impact on society


3. The future on this course looks grim > push for “connectedness”


4. Impactful mitigation will require uni
fi
ed e
ff
orts from tech and gov
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Thanks! No questions?
Phone


+49 (0)4835 9513027
Email


lars.hilse@gmail.com


PGP Key I
D

17FFC660
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime

More Related Content

What's hot

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 

What's hot (20)

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 

Similar to Cyberterrorism. Past, Present, Future

The Most Innovative Cyber Security Leaders to Watch in 2023.pdf
The Most Innovative Cyber Security Leaders to Watch in 2023.pdfThe Most Innovative Cyber Security Leaders to Watch in 2023.pdf
The Most Innovative Cyber Security Leaders to Watch in 2023.pdfciolook1
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitycajiwol341
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfChinatu Uzuegbu
 

Similar to Cyberterrorism. Past, Present, Future (20)

Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
The Most Innovative Cyber Security Leaders to Watch in 2023.pdf
The Most Innovative Cyber Security Leaders to Watch in 2023.pdfThe Most Innovative Cyber Security Leaders to Watch in 2023.pdf
The Most Innovative Cyber Security Leaders to Watch in 2023.pdf
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyberterrorism. Past, Present, Future

  • 1. Cyberterrorism November, 2020 WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime Past, Present, Future
  • 2. highly functioning savant political/corporate advisor, and expert/witness in information security // 
 focus on the risks of cyber terrorism, and cyber warfare/crime, and their impact on the security of critical, national/global infrastructure // cyber incident fi rst responder // digital strategy consultant // podcast host at The Very Best Podcast In The World // blogger // chairman at The Global Internet Magna Carta Project // etc. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 3. The next 30 minutes of your life 1. Past incidents and what they taught us 
 2. What are the present risks of cyberterrorism 
 3. What does the future of cyberterrorism look like 
 4. What can you do to mitigate cyberterrorism risks WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 4. De fi nitions of (cyber-)terrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or signi fi cant bodily harm, in order to achieve political or ideological gains through threat or intimidation. 
 Terrorism is the use of International violence for political or religious purposes. It is used in this regard primarily to refer to violence during peacetime or in the context of war against non-combatants. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 5. Past pars pro toto Stuxnet (Natanz, 2010) 
 Bangladesh Bank Cyber Heist (Dhaka, 2016) 
 NotPetya (Global, 2017) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 6. Past Countless, less noteworthy attacks WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 7. Past Only 7 years between targeted attack to attack w/ global fallout WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 8. Past Signi fi cant impact & massive collateral damage WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 9. Past Only assumptions, no convictions WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 10. Present Politically and organisationally ignored WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 11. Present (Non-)state actor arms race WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 12. Present Dire impact on society 
 (no electricity, no communication, no payment, no critical infrastructure, no…) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 13. Present Protection from WHAT? WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 14. Present The internet hasn’t reached a stage at which 
 we can mindlessly digitise everything WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 15. Future Two dimensions: (1) Arms race (2) increasing vulnerability WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 16. Future Push for “connectedness” > neuralink, wearables, IoT, Industry 4.0, “Great Reset”, connected driving, unmanned areal vehicles, pilotless sea vessels, smart grid, etc. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 17. Future Exponentially increasing risk > even more vulnerable than we currently are WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 18. Mitigation (Organisational pressure) for the creation of legislative framework to secure critical infrastructure (globally) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 19. Mitigation International agreements beyond NATO’s Tallinn Manual to protect civilian infrastructure from cyberterrorism & cyberwarfare WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 20. Mitigation ISO27XXX ain’t gonna save ya ‘cause it’s only REACTIVE!!!!!1 - rather - Holistic approach > Advanced Cyber Security Risk Assessment Checklist 
 HTTPS://LARSHILSE.COM/GO/ACRAC WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 21. The past 30 minutes of your life 1. Past incidents increased in number & fallout 
 2. Attacks today would have severe impact on society 
 3. The future on this course looks grim > push for “connectedness” 
 4. Impactful mitigation will require uni fi ed e ff orts from tech and gov WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 22. Thanks! No questions? Phone +49 (0)4835 9513027 Email lars.hilse@gmail.com PGP Key I D 17FFC660 WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime