Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia
Digital Disruption What does this mean for cyber security? Digital Changes Everything The character of digital disruption is changing [to] a pervasive, always-on digital ecosystem fueled by the explosion of data from the dramatic rise in sensors, and made ubiquitous by mobility. The world, and our digital representation of it, are merging and this self-interpreting world will be massively disruptive. Source: Boston Consulting Group The IoT MOBILES DATA
The Digital Context It s our recognition that if you go to bed as an industrial company, you re going to wake up as a software company Jeffrey Imelda, Chairman and CEO of General Electric
Internet Access 2000 370 million 2015 3.1 billion
2005 2013 St Peter s Square
Mobile and Smart Phones 2000 740 million 2015 7.3 billion
Facebook 1.4B 1.35B 1.24B Population Size
1 2 3 always, anywhere information
2005 2005 2013 Messaging in 60 seconds 347,222 tweets in a single day 205 Billion 1.45 Million
Video in 60 seconds 300 hours new video
Photos in 60 seconds 1.74 million photos
e-commerce Global trade starts here. TM 1.9 million Australian small and mid-sized businesses #2 Chinese brand e-wto facilitates and regulates trade between countries. 279 MILLION Buyers 8.5 MILLION Sellers 12.7 BILLION Annual Orders 5 BILLION Packages Delivered Annually 270 BILLION GMV Retail
The IoT three in five respondents (60%) agree that lack of trust and concerns about data privacy are hampering consumer uptake of the IoT. Source: The Economist smart dust in 2015 15 billion objects smart city machine-man mind meld 40.2% Business and Manufacturing 30.3% Health Care 8.3% Retail 7.7% Security 4.1% Transportation
The Business Context
Some economists are offering radical thoughts on the job-destroying power of this new technological wave [digitisation]. Carl Benedikt Frey and Michael Osborne, of Oxford University, recently analysed over 700 different occupations to see how easily they could be computerised, and concluded that 47% of employment in America is at high risk of being automated away over the next decade or two. Messrs Brynjolfsson and McAfee ask whether human workers will be able to upgrade their skills fast enough to justify their continued employment. Other authors think that capitalism itself may be under threat. Source: The Economist
Five Digital Innovations Media Fitness Delivery Investment Banking that disrupted five huge industries and no-one saw them coming. Source: Hewlett Packard
Global CEO Concerns Q: How concerned are you about the following potential economic, policy, social and business threats to your organisation s growth prospects? PWC 18th Annual CEO Survey 2016 Over-regulation 78% The real benefit of cyber security isn t just in defending value. It s about creating new value by enabling the trust that s so central to doing business today. Availability of key skills 73% (74%) CEOs Identified three factors that are vital for Govt. and fiscal deficit / debt 72% success: Geopolitical uncertainty Increasing tax burden Cyber threats / data security 61% 72% 70% (74%) Digital Transformation Creating new value in new ways through digital transformation. Consumer behaviour / spend Social instability Speed of technology change 60% (57%) 60% 58% (67%) Partnerships Developing diverse and dynamic partnerships New market entrants 54% (79%) Diversity Finding different ways of thinking and working. Source: Price Waterhouse Coopers
Strategic Technologies Technologies seen as strategically important by Global CEOs CEOs are in no doubt about the role information can play in gaining insight about customers and how to engage with them. The sheer ubiquity of mobile devices today has revolutionised customers ability to obtain information which has, in turn, transformed how they perceive value and the type of relationships they want to have with companies. Mobile Data Cyber Security IoT Social 81 % 80 % 78 % 65 % 61 % (86 % ) (90 % ) (86 % ) (76 % ) (-) 76% of Australian CEOs interviewed thought that Cloud Computing was a strategic technology fro their business. Source: Price Waterhouse Coopers
Why Do This? Experts predict significant value for Australia from successful participation in the Internet of Things however success will be dependent on our ability to retain Customer and Partner TRUST through effective cyber security measures. Raise GDP by $37 billion in 2024. $A139 Billion economy by 2020 $A538 Billion IoT market for APeJ * by 2020 * Asia Pacific excluding Japan
Cyber Security Context
The Current State of Play 60 % of all targeted attacks struck small and medium sized organizations 317 million new pieces of malware created - nearly one million a day 183 % Denial of Service attacks between Jan and Aug 2014 5out 6 of large companies targeted by attackers in 2014 24 zero days combined 295 days before new exploits were patched 38 % increase in detected cyber security incidents Source: Price Waterhouse Coopers
Challenges 16% INEFFECTIVE SECURITY STRATEGY 10% NEW TRENDS IN BUSINESS MODELS 20% NEW TRENDS IN TECHNOLOGY 7% OTHERS Greatest Obstacles 27% SHORTAGE OF IN-HOUSE SKILLS AND EXPERTISE 20% SENIOR MANAGER APPROVAL The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million Michael Brown, CEO at Symantec,. Q: What do you consider to be the 3 greatest obstacles to improving the overall effectiveness of your organisation s information security capability? Source: Telstra
Transparency at the Edge Open Share the Wealth Lead the Revolution Core Edge Guard the Jewels Expand the Empire Closed The sheer ubiquity of mobile devices has revolutionised customers ability to obtain information which has, in turn, transformed how they perceive value and the type of relationships they want to have with companies.
WHAT HAPPENS NOW?
Three Tier Approach PRIORITY 1 PROTECT AUSTRALIA PRIORITY 2 ENABLE DIGITISATION PRIORITY 3 NURTURE INNOVATION
PROTECT AUSTRALIA A comprehensive Cyber Strategy Strategy Who is in charge? What is the strategy? Role of Government Role of Enterprise (and Others) Risk Assessment Priorities Implementation Plan Cyber security resources / skills allocated Minimum standards implemented Incident response teams identified and trained External bench / virtual teams Improve awareness and education Accreditations and training Ongoing Compliance Standards compliance review Security assessments Vulnerability testing Incident response and protection Managed security services Security research Defensive Offensive Intelligence Innovative Intelligence Policy Framework Business case Policy incentives Minimum cyber security guidelines Risk management structure Information sharing guidelines Collaboration Process Information sharing operations Improved awareness and collaboration Board and CEO training/awareness Reputation protection
ENABLE DIGITISATION Social Processes Social media is reshaping the way customers interact with business. Transparency, access to more data and self-control of information may be required. What new skills, processes and tools will cyber security teams require to keep up with the new business models? Enterprise Nation-state level attack kits often make their way into the hands of regular hackers giving them far more sophisticated capability to attack non-government targets. How will you respond in the event of a such sophisticated attack? New Attack Vectors Unlimited Attack Surface More Sophisticated Attacks IoT, Mobiles & Data Each of the millions of sensors your business may need connected to the Internet is a potential vulnerability. What must security teams do remove this vulnerability and protect their companies data in the wild?
NURTURE INNOVATION Public and private sector Investment in cyber security should be encouraged to ensure that Australia remains one of the world's Top 10 attractive markets for growth. AI MIT researchers have announced an artificial intelligence breakthrough as intuition algorithm beats humans in data test. What opportunities does this create for Australia? Quantum Recent strides in the area of massively powerful Quantum computing pave the way for a faster quantum computer. What innovative responses could be developed by Australia? 3D Printing Everybody can create their own physical product based on their custom design, and no approval needed from any giant manufacturer! What does this mean for cyber security in Australia?
Conclusion Anyone in this room who thinks that Digital Disruption doesn t impact them and that they don t need to change, has already made their first BIG mistake." Source: Greg Rudd
THANKS FOR LISTENING!