Government + Enterprise + Innovation + Strategy

Similar documents
Australian Government Cyber Security Review

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Digital Strategy. How to create a successful business strategy for the digital world.

data driven government

Cyber security Building confidence in your digital future

Data analytics Delivering intelligence in the moment

INFORMATION & COMMUNICATIONS TECHNOLOGY

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Business Networks: The Next Wave of Innovation

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL

techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption

95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Making the Internet Business-Ready

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

REPORT. Next steps in cyber security

Resilience and Cyber Essentials

Introduction to Cybersecurity Overview. October 2014

Escalating concern over cyber threats has CEOs warming to government collaboration

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Some Thoughts on the Future of Cyber-security

Attack Intelligence: Why It Matters

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Cyber security Building confidence in your digital future

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

Cyber-Security Risk in the Global Organization:

CREATING A BRILLIANT DIGITAL FUTURE

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Assessing the strength of your security operating model

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

CYBER SECURITY Audit, Test & Compliance

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Developing a robust cyber security governance framework 16 April 2015

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Deep Learning Meets Heterogeneous Computing. Dr. Ren Wu Distinguished Scientist, IDL, Baidu

HP Fortify Software Security Center

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PwC Cybersecurity Briefing

Building a Business Case:

Cyber Risk Reduction: Why Automated Threat Verification is key

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Compliance Guide: ASD ISM OVERVIEW

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Symantec Managed Security Services The Power To Protect

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

THE THREE Es OF MODERN SECURITY FOR PHISHING

Igniting the Next Industrial Revolution

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Siemens and IBM team on next generation of cloud-based building energy management solutions

Middle Class Economics: Cybersecurity Updated August 7, 2015

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

State of Security Survey GLOBAL FINDINGS

The firm. of the future. Accelerating sustainable progress. Your business technologists. Powering progress

Cyber Security: Confronting the Threat

DIGITAL REVOLUTION DISRUPTIVE INNOVATION AND SUSTAINABLE BUSINESS

end to end marketing automation

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Finding Security in the Cloud

Combating a new generation of cybercriminal with in-depth security monitoring

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Cybersecurity Best Practices

Nine Steps to Smart Security for Small Businesses

CFIR - Finance IT 2015 Cyber security September 2015

Internet threats: steps to security for your small business

Understanding the significance of the Asian Century. Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Transcription:

Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia

Digital Disruption What does this mean for cyber security? Digital Changes Everything The character of digital disruption is changing [to] a pervasive, always-on digital ecosystem fueled by the explosion of data from the dramatic rise in sensors, and made ubiquitous by mobility. The world, and our digital representation of it, are merging and this self-interpreting world will be massively disruptive. Source: Boston Consulting Group The IoT MOBILES DATA

The Digital Context It s our recognition that if you go to bed as an industrial company, you re going to wake up as a software company Jeffrey Imelda, Chairman and CEO of General Electric

Internet Access 2000 370 million 2015 3.1 billion

2005 2013 St Peter s Square

Mobile and Smart Phones 2000 740 million 2015 7.3 billion

Facebook 1.4B 1.35B 1.24B Population Size

1 2 3 always, anywhere information

2005 2005 2013 Messaging in 60 seconds 347,222 tweets in a single day 205 Billion 1.45 Million

Video in 60 seconds 300 hours new video

Photos in 60 seconds 1.74 million photos

e-commerce Global trade starts here. TM 1.9 million Australian small and mid-sized businesses #2 Chinese brand e-wto facilitates and regulates trade between countries. 279 MILLION Buyers 8.5 MILLION Sellers 12.7 BILLION Annual Orders 5 BILLION Packages Delivered Annually 270 BILLION GMV Retail

The IoT three in five respondents (60%) agree that lack of trust and concerns about data privacy are hampering consumer uptake of the IoT. Source: The Economist smart dust in 2015 15 billion objects smart city machine-man mind meld 40.2% Business and Manufacturing 30.3% Health Care 8.3% Retail 7.7% Security 4.1% Transportation

The Business Context

Some economists are offering radical thoughts on the job-destroying power of this new technological wave [digitisation]. Carl Benedikt Frey and Michael Osborne, of Oxford University, recently analysed over 700 different occupations to see how easily they could be computerised, and concluded that 47% of employment in America is at high risk of being automated away over the next decade or two. Messrs Brynjolfsson and McAfee ask whether human workers will be able to upgrade their skills fast enough to justify their continued employment. Other authors think that capitalism itself may be under threat. Source: The Economist

Five Digital Innovations Media Fitness Delivery Investment Banking that disrupted five huge industries and no-one saw them coming. Source: Hewlett Packard

Global CEO Concerns Q: How concerned are you about the following potential economic, policy, social and business threats to your organisation s growth prospects? PWC 18th Annual CEO Survey 2016 Over-regulation 78% The real benefit of cyber security isn t just in defending value. It s about creating new value by enabling the trust that s so central to doing business today. Availability of key skills 73% (74%) CEOs Identified three factors that are vital for Govt. and fiscal deficit / debt 72% success: Geopolitical uncertainty Increasing tax burden Cyber threats / data security 61% 72% 70% (74%) Digital Transformation Creating new value in new ways through digital transformation. Consumer behaviour / spend Social instability Speed of technology change 60% (57%) 60% 58% (67%) Partnerships Developing diverse and dynamic partnerships New market entrants 54% (79%) Diversity Finding different ways of thinking and working. Source: Price Waterhouse Coopers

Strategic Technologies Technologies seen as strategically important by Global CEOs CEOs are in no doubt about the role information can play in gaining insight about customers and how to engage with them. The sheer ubiquity of mobile devices today has revolutionised customers ability to obtain information which has, in turn, transformed how they perceive value and the type of relationships they want to have with companies. Mobile Data Cyber Security IoT Social 81 % 80 % 78 % 65 % 61 % (86 % ) (90 % ) (86 % ) (76 % ) (-) 76% of Australian CEOs interviewed thought that Cloud Computing was a strategic technology fro their business. Source: Price Waterhouse Coopers

Why Do This? Experts predict significant value for Australia from successful participation in the Internet of Things however success will be dependent on our ability to retain Customer and Partner TRUST through effective cyber security measures. Raise GDP by $37 billion in 2024. $A139 Billion economy by 2020 $A538 Billion IoT market for APeJ * by 2020 * Asia Pacific excluding Japan

Cyber Security Context

The Current State of Play 60 % of all targeted attacks struck small and medium sized organizations 317 million new pieces of malware created - nearly one million a day 183 % Denial of Service attacks between Jan and Aug 2014 5out 6 of large companies targeted by attackers in 2014 24 zero days combined 295 days before new exploits were patched 38 % increase in detected cyber security incidents Source: Price Waterhouse Coopers

Challenges 16% INEFFECTIVE SECURITY STRATEGY 10% NEW TRENDS IN BUSINESS MODELS 20% NEW TRENDS IN TECHNOLOGY 7% OTHERS Greatest Obstacles 27% SHORTAGE OF IN-HOUSE SKILLS AND EXPERTISE 20% SENIOR MANAGER APPROVAL The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million Michael Brown, CEO at Symantec,. Q: What do you consider to be the 3 greatest obstacles to improving the overall effectiveness of your organisation s information security capability? Source: Telstra

Transparency at the Edge Open Share the Wealth Lead the Revolution Core Edge Guard the Jewels Expand the Empire Closed The sheer ubiquity of mobile devices has revolutionised customers ability to obtain information which has, in turn, transformed how they perceive value and the type of relationships they want to have with companies.

WHAT HAPPENS NOW?

Three Tier Approach PRIORITY 1 PROTECT AUSTRALIA PRIORITY 2 ENABLE DIGITISATION PRIORITY 3 NURTURE INNOVATION

PROTECT AUSTRALIA A comprehensive Cyber Strategy Strategy Who is in charge? What is the strategy? Role of Government Role of Enterprise (and Others) Risk Assessment Priorities Implementation Plan Cyber security resources / skills allocated Minimum standards implemented Incident response teams identified and trained External bench / virtual teams Improve awareness and education Accreditations and training Ongoing Compliance Standards compliance review Security assessments Vulnerability testing Incident response and protection Managed security services Security research Defensive Offensive Intelligence Innovative Intelligence Policy Framework Business case Policy incentives Minimum cyber security guidelines Risk management structure Information sharing guidelines Collaboration Process Information sharing operations Improved awareness and collaboration Board and CEO training/awareness Reputation protection

ENABLE DIGITISATION Social Processes Social media is reshaping the way customers interact with business. Transparency, access to more data and self-control of information may be required. What new skills, processes and tools will cyber security teams require to keep up with the new business models? Enterprise Nation-state level attack kits often make their way into the hands of regular hackers giving them far more sophisticated capability to attack non-government targets. How will you respond in the event of a such sophisticated attack? New Attack Vectors Unlimited Attack Surface More Sophisticated Attacks IoT, Mobiles & Data Each of the millions of sensors your business may need connected to the Internet is a potential vulnerability. What must security teams do remove this vulnerability and protect their companies data in the wild?

NURTURE INNOVATION Public and private sector Investment in cyber security should be encouraged to ensure that Australia remains one of the world's Top 10 attractive markets for growth. AI MIT researchers have announced an artificial intelligence breakthrough as intuition algorithm beats humans in data test. What opportunities does this create for Australia? Quantum Recent strides in the area of massively powerful Quantum computing pave the way for a faster quantum computer. What innovative responses could be developed by Australia? 3D Printing Everybody can create their own physical product based on their custom design, and no approval needed from any giant manufacturer! What does this mean for cyber security in Australia?

Conclusion Anyone in this room who thinks that Digital Disruption doesn t impact them and that they don t need to change, has already made their first BIG mistake." Source: Greg Rudd

THANKS FOR LISTENING!