SlideShare uma empresa Scribd logo
1 de 18
Digital 9/11: Next time, what if the
attackers never have to leave home?
The rise of autonomy & IOT means the next
attack may not require physical hijackers or
bombs to kill Americans & damage our economy
Kevin Mireles 1
Despite the dangers, today IT, largely exists outside of a
formal regulatory, legal, law enforcement & security
framework as if computers were still relegated to our desktops
Kevin Mireles 2
As a result the IT security model relies on
private armies & a buyer-beware model
Kevin Mireles 3
Meanwhile computers have migrated from the desktop in
accounting to being integrated into every facet of our life, from
brakes to brain implants putting each one of us on the front
lines of cyber warfare & anarchy
Kevin Mireles 4
We are returning to the middle ages, when national
borders & armies didn’t exist, so every little region built
their own castles & turned to mercenaries for defense
Kevin Mireles 5
The problem is, just as castle walls couldn’t be built tall enough & thick enough
to defend against new technologies, e.g. cannons, neither can individual
organizations defend against ever more devious and destructive cyber weapons
Unfortunately, where companies can spend millions
on defense, nation states can spend billions on
offense, overwhelming any individual target
Kevin Mireles 6
A new parallel cyber legal, regulatory, public health,
law enforcement & military infrastructure is required
to adapt to the new challenges
“Organizations are designed to meet the needs and
challenges of yesterday, not of today or tomorrow,
but lessons and frameworks can be leveraged from
the past to build the future.”
Kevin Mireles 7
We need to develop new laws & institutions just like we did in
the 20th century to address the rise of new technologies like
cars, planes, nuclear power, medical devices, electricity, etc.
Kevin Mireles 8
Developing a cyber public-health framework
and ecosystem is a key first step
Kevin Mireles 9
Kevin Mireles 10
Kevin Mireles 11
Today, we are largely in the dark about the
cyber health of the organizations that govern
us, employ us, hold our data or we invest in.
Would we have invested in TNT if we had have known the risk?
How come citizens weren’t aware that Atlanta was so vulnerable,
especially when security experts weren’t surprised?
Kevin Mireles 12
Hackers & viruses don’t need report cards to target
vulnerabilities, but we do & we need cyber public
health organizations setting standards and providing
insights to us just like they do for restaurants
Kevin Mireles 13
We need sensitive high-velocity detect and
react systems, just like are being built for
earthquakes & diseases so organizations can
instantly take protective measures
Kevin Mireles 14
IT-enabled products must meet key safety/ security
standards in accordance with their potential risk, just
like cars, medical devices, etc.
Liability & responsibility for security must be shifted to
the creator not unsophisticated buyers
Risk
Regulation
Kevin Mireles 15
A safety first model becomes ever more critical given
the rise of autonomous systems that can be
reprogrammed to cause physical harm
How long before the first rabid robot attack occurs?
Kevin Mireles 16
Citizens and companies should be able to turn to
public institutions for assistance for prevention and
emergency response, not just private companies
If I’m getting physically robbed, I don’t just call ADT, I dial 911!
Kevin Mireles 17
The first step is recognizing that the new threats are
bigger than the pain of new regulations & build coalitions
to help shape the inevitable government intervention
Kevin Mireles 18

Mais conteúdo relacionado

Mais procurados

Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
ProductNation/iSPIRT
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
EnergySec
 

Mais procurados (20)

Mbs t17
Mbs t17Mbs t17
Mbs t17
 
De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond. De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond.
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of Exploitation
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...
Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...
Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...
 
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew RosenquistCybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know
 
What Is IoT or Internet of Things?
What Is IoT or Internet of Things?What Is IoT or Internet of Things?
What Is IoT or Internet of Things?
 
Dehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & SecurityDehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & Security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coCybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot How small devices make the biggest impact on the iot
How small devices make the biggest impact on the iot
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 

Semelhante a Preventing the Digital 9/11 & Other Cyber Disasters

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 

Semelhante a Preventing the Digital 9/11 & Other Cyber Disasters (20)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Ey managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurityEy managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurity
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 

Mais de kevinjmireles

Mais de kevinjmireles (20)

Logistics Sustainability & Profitability 101
Logistics Sustainability & Profitability 101Logistics Sustainability & Profitability 101
Logistics Sustainability & Profitability 101
 
The Billion Dollar Challenge Latest 4-2-2021.pptx
The Billion Dollar Challenge Latest 4-2-2021.pptxThe Billion Dollar Challenge Latest 4-2-2021.pptx
The Billion Dollar Challenge Latest 4-2-2021.pptx
 
Minimum viable replacement presentation sIM presentation
Minimum viable replacement presentation sIM presentationMinimum viable replacement presentation sIM presentation
Minimum viable replacement presentation sIM presentation
 
Avoid a Billion Tons of CO2 by Rightsizing packages
Avoid a Billion Tons of CO2 by Rightsizing packagesAvoid a Billion Tons of CO2 by Rightsizing packages
Avoid a Billion Tons of CO2 by Rightsizing packages
 
Probability: Understanding impact of complexity & uncertainty
Probability: Understanding impact of complexity & uncertaintyProbability: Understanding impact of complexity & uncertainty
Probability: Understanding impact of complexity & uncertainty
 
Minimum Viable Replacement: 5 Steps to Success
Minimum Viable Replacement: 5 Steps to SuccessMinimum Viable Replacement: 5 Steps to Success
Minimum Viable Replacement: 5 Steps to Success
 
Yes We Will: Simplifying civic engagement & personalized political reporting
Yes We Will: Simplifying civic engagement & personalized political reportingYes We Will: Simplifying civic engagement & personalized political reporting
Yes We Will: Simplifying civic engagement & personalized political reporting
 
Minimum Viable Replacement: April 25, 2021
Minimum Viable Replacement: April 25, 2021Minimum Viable Replacement: April 25, 2021
Minimum Viable Replacement: April 25, 2021
 
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
 
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
The Billion Dollar Challenge: Making Memphis the Leader in Inclusive Tech, Li...
 
7 Deadly Sins of Software Development
7 Deadly Sins of Software Development 7 Deadly Sins of Software Development
7 Deadly Sins of Software Development
 
7 Deadly Sins of Enterprise Software Development V8
7 Deadly Sins of Enterprise Software Development V87 Deadly Sins of Enterprise Software Development V8
7 Deadly Sins of Enterprise Software Development V8
 
Minimum Viable Replacement:
Minimum Viable Replacement: Minimum Viable Replacement:
Minimum Viable Replacement:
 
MyRepresentatives
MyRepresentativesMyRepresentatives
MyRepresentatives
 
Seven Deadly Sins of Enterprise Software Development & What to do About Them
Seven Deadly Sins of Enterprise Software Development & What to do About ThemSeven Deadly Sins of Enterprise Software Development & What to do About Them
Seven Deadly Sins of Enterprise Software Development & What to do About Them
 
Kevin's Software Success Equation
Kevin's Software Success EquationKevin's Software Success Equation
Kevin's Software Success Equation
 
How to Predict Your Software Project's Probability of Success
How to Predict Your Software Project's Probability of SuccessHow to Predict Your Software Project's Probability of Success
How to Predict Your Software Project's Probability of Success
 
Memphis innovation & technology council
Memphis innovation & technology councilMemphis innovation & technology council
Memphis innovation & technology council
 
MyRepresentatives knight foundation Application
MyRepresentatives knight foundation ApplicationMyRepresentatives knight foundation Application
MyRepresentatives knight foundation Application
 
Silly Willy's Christmas Adventure
Silly Willy's Christmas AdventureSilly Willy's Christmas Adventure
Silly Willy's Christmas Adventure
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Preventing the Digital 9/11 & Other Cyber Disasters

  • 1. Digital 9/11: Next time, what if the attackers never have to leave home? The rise of autonomy & IOT means the next attack may not require physical hijackers or bombs to kill Americans & damage our economy Kevin Mireles 1
  • 2. Despite the dangers, today IT, largely exists outside of a formal regulatory, legal, law enforcement & security framework as if computers were still relegated to our desktops Kevin Mireles 2
  • 3. As a result the IT security model relies on private armies & a buyer-beware model Kevin Mireles 3
  • 4. Meanwhile computers have migrated from the desktop in accounting to being integrated into every facet of our life, from brakes to brain implants putting each one of us on the front lines of cyber warfare & anarchy Kevin Mireles 4
  • 5. We are returning to the middle ages, when national borders & armies didn’t exist, so every little region built their own castles & turned to mercenaries for defense Kevin Mireles 5 The problem is, just as castle walls couldn’t be built tall enough & thick enough to defend against new technologies, e.g. cannons, neither can individual organizations defend against ever more devious and destructive cyber weapons
  • 6. Unfortunately, where companies can spend millions on defense, nation states can spend billions on offense, overwhelming any individual target Kevin Mireles 6
  • 7. A new parallel cyber legal, regulatory, public health, law enforcement & military infrastructure is required to adapt to the new challenges “Organizations are designed to meet the needs and challenges of yesterday, not of today or tomorrow, but lessons and frameworks can be leveraged from the past to build the future.” Kevin Mireles 7
  • 8. We need to develop new laws & institutions just like we did in the 20th century to address the rise of new technologies like cars, planes, nuclear power, medical devices, electricity, etc. Kevin Mireles 8
  • 9. Developing a cyber public-health framework and ecosystem is a key first step Kevin Mireles 9
  • 12. Today, we are largely in the dark about the cyber health of the organizations that govern us, employ us, hold our data or we invest in. Would we have invested in TNT if we had have known the risk? How come citizens weren’t aware that Atlanta was so vulnerable, especially when security experts weren’t surprised? Kevin Mireles 12
  • 13. Hackers & viruses don’t need report cards to target vulnerabilities, but we do & we need cyber public health organizations setting standards and providing insights to us just like they do for restaurants Kevin Mireles 13
  • 14. We need sensitive high-velocity detect and react systems, just like are being built for earthquakes & diseases so organizations can instantly take protective measures Kevin Mireles 14
  • 15. IT-enabled products must meet key safety/ security standards in accordance with their potential risk, just like cars, medical devices, etc. Liability & responsibility for security must be shifted to the creator not unsophisticated buyers Risk Regulation Kevin Mireles 15
  • 16. A safety first model becomes ever more critical given the rise of autonomous systems that can be reprogrammed to cause physical harm How long before the first rabid robot attack occurs? Kevin Mireles 16
  • 17. Citizens and companies should be able to turn to public institutions for assistance for prevention and emergency response, not just private companies If I’m getting physically robbed, I don’t just call ADT, I dial 911! Kevin Mireles 17
  • 18. The first step is recognizing that the new threats are bigger than the pain of new regulations & build coalitions to help shape the inevitable government intervention Kevin Mireles 18

Notas do Editor

  1. Apply 20th century concepts to 21st century cyber challenges
  2. Public health organizations implemented, monitored and enforced regulations designed to keep the public safe.
  3. Public health organizations implemented, monitored and enforced regulations designed to keep the public safe.