26
Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought) Information Security Professional – EY OTS/TAS Cyber Security @drgfragkos OWASP Cambridge Chapter meetup, Tuesday 6 November 2018, Lord Ashcroft Building (LAB003/LAB006), Cyber Security and Networking Research Group, Anglia Ruskin University, Cambridge

“A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Dr. Grigorios Fragkos

“A holistic view on Cyber Security in evolutionary terms” (food-for-thought)

Information Security Professional – EY OTS/TAS Cyber Security

@drgfragkos

OWASP Cambridge Chapter meetup, Tuesday 6 November 2018, Lord Ashcroft Building (LAB003/LAB006), Cyber Security and Networking Research Group, Anglia Ruskin University, Cambridge

Page 2: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Agenda

“ our security mindset ”

“ intended to spark a personal "eureka" moment in the mindmap of

each security professional inside and outside this room ”

Page 3: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

The Red Queen hypothesis

“ The Red Queen hypothesis, also referred to as the Red Queen effect,is an evolutionary hypothesis which proposes that organisms mustconstantly adapt, evolve, and proliferate, not merely to gain areproductive advantage, but also simply to survive while pitted against

ever-evolving rival organisms in a continuously changing environment ”goo.gl/rrzVvi

Page 4: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

The Threat Landscape

“ Now here, you see, it takes all the running

you can do, to keep in the same place ”

Page 5: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

The Cyber Security in evolutionary terms

“ As cyber threats evolve, we need to be in a position to equally evolve,

otherwise we simply keep "running" just to stay at the same place ”

Page 6: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Lets discuss…

Threat Landscape

Stayup-to-date

Security community

Hiring Talents

Zero toHero

Security

Mindset

why are you in

security?

Ethics

educatenetwork

participate

business needs

Was told:Don’t scare

them

Asking the difficult

questions

Page 7: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

“ What is Security ? ”

“ What is Cyber ? ”

“ What is Cyber Security ? ”

Page 8: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

What is Security?

The Cambridge Dictionary describes security as:“The ability to avoid being harmed by any risk, danger or threat”

The Oxford English Dictionary describes security as:“The state of being or feeling secure”…where “secure” is described as “protected against attack or other criminal activity”

Page 9: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

What is Security?

The ISO 28001 describes security as:“resistance to intentional acts designed to cause harm or damage to or by the supply chain”

The ISO 17522 describes security as:“combination of confidentiality, integrity, and availability”

Page 10: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

What is Security?

The ISO 20000 describes information security as:“preservation of confidentiality, integrity and availability of information”

The Wikipedia page describes security as:“Security resilience against, potential harm (or other unwanted coercive change) from external forces”

Page 11: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

What is Cybersecurity?

The ISO 27032 describes cybersecurity as:“preservation of confidentiality, integrity and availability of information in the Cyberspace”

The ISO 17522 describes security as:“combination of confidentiality, integrity, and availability”…where “secure” is described as “protected against attack or other criminal activity”

Page 12: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Security in the context of the Information Age

“The state of being or feeling secure, by having the ability to avoidbeing harmed at an irrecoverable level, by any risk, danger or threat,

when/for protecting a specific asset”

Page 13: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

The Security of Digital Ecosystems

“Security is the enabler for evolving and scaling up in a securemanner, while minimising the risk of being affected at an

irrecoverable level.”

Page 14: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Into perspective

3 million lines of software codeon the ground support more than

1.5 million lines

of flight software code

100m

..run on 44 computers, communicating via 100 data

networks, transferring 400,000 signals

Page 15: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Into perspective

Burj Khalifa2723ft

Page 16: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Into perspective

830m100m

Page 17: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Into perspective

830m100m

Page 18: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Into perspective

2400m

Page 19: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

?

Page 20: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security
Page 21: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security
Page 22: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Twitter

Security Champion

Developers vs Breakers

OWASP, OSSTMM, ISO,

ENISA, NIST, PCI DSS, SANS Top 20, NCSC,

EDPS, ICO, CERT-EU

IdentifyProtectDetect

RespondContainRecover

Laws & Regulations

Business RISK

Enabler

CyberResilienceStrategy

Page 23: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

“..moved from Information Assurance to Mission Assurance.”

#TallinnManual

Page 24: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Security Legend

#SecurityLegend

Page 25: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security

Time for Questions!

Thank you for your attention

#OWASPLondon #CyberLondon

@drgfragkos

Page 26: “A holistic view on Cyber Security in evolutionary …...Dr. Grigorios Fragkos “A holistic view on Cyber Security in evolutionary terms” (food-for-thought)Information Security