20
Expect the Unexpected Rik Ferguson Vice President, Security Research Trend Micro @rik_ferguson

Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

Expect the UnexpectedRik FergusonVice President, Security ResearchTrend Micro

@rik_ferguson

Page 2: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THE UNEXPECTED

WE’VE GOT NEXT-GEN THREAT DEFENCE!

Source: @MatiasKatz

Page 3: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THREAT ACTORS

OrganisedCybercrime

Industrial Espionage

Activists / Terrorists

State Sponsored

Page 4: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

TECHNOLOGY DISRUPTIONHow digital disruption will impact cybersecurity

Page 5: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

WHAT’S ONE THING IN COMMON HERE?

Page 6: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

EXPECT TECHNOLOGY DISRUPTION

“Digital disruption,

when properly

understood, should

terrify you.”

James McQuivey

Author of “Digital Disruption:

Unleashing the Next Wave of Innovation”

Page 7: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DISRUPTION #1: CLOUD COMPUTING

Cloud computing has disrupted

every industry it has touched.

Enable more disruptive

technologies to come.

Hackers will find and attack

weaknesses in the building blocks

and joints of cloud computing.

Page 8: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DISRUPTION #2: MOBILE

“Every once in a while a revolutionary

product comes along that changes

everything.”

- Steve Jobs, 2007

Empowering Wearable

Technologies, Location Sensing

and Internet of Things (IoT) today.

Cybercriminals can strike their

targets from anywhere.

More entry points for them to

infiltrate an unsecured system or

network.

Page 9: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DISRUPTION #3: BIG DATA

Organisations will use Big Data to satisfy their customers better.

Hackers will also use Big Data to exploit their victims better.

Page 10: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DISRUPTION #4: SOCIAL MEDIA

Social media helps reach people easier and quicker.

Cybercriminals want to reach you similarly too.

Page 11: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DISRUPTION #5: INTERNET OF THINGS

Anything and everything

that connects with the

Internet can be hacked.

IoT could be the “Network

of all networks” in the

future.

25 billion connected things by 2020 – Gartner

Immature and experimental

now.

Page 12: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

UP AND COMING F

Page 13: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THE FUTURE OF CYBER

THREATS

Page 14: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THE FUTURE OF CYBER THREATS

Disruptive technologies will

produce large, complex and

intelligent hyper-connected

networks.

Cybercriminals will follow

technology disruption closely

to develop and launch attacks

in unexpected ways.

Page 15: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THE FUTURE OF CYBER THREATS

Cloud-powered Botnets and DDoS Attacks

Electronic Attacks on Critical

Infrastructure

Micro-Criminality Bio-hacks for Multi-factor Authentication

Cyber-enabled Violence

Malware for Humans

Cyber Gang Wars

High Impact, Targeted Identity Theft and Avatar

Hijack

Sophisticated Reputation Manipulation

Misuse of Augmented Reality

Abuse of Unmanned Vehicles and

Smart Machines

Hacks against Internet of Things

with Direct Physical Impact

Source: Project 2020 by ICSPA, Europol and Trend Micro

Page 16: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

HOW CYBERSECURITY CAN

PREVAIL

Page 17: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

17

BASIC INTERMEDIATE ADVANCED

Endpoint Security

Network Segmentation

Firewall & IPS

Web Security

Application Security

Two-Factor Authentication

Mobile Security

Data Security

Advanced Threat

Detection

Security Intelligence

Network Forensics

Connected Threat

Defence

SECURITY OPERATIONS

Access Management • Change Management • Vulnerability Management • Incident

Response

DEFENDING AGAINST THE UNEXPECTED

Page 18: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

DEFENDING AGAINST THE UNEXPECTED

Assess Educate Identify gaps KPIsContinuous Improvement

Report

Action Plan for Cybersecurity Leaders

Page 19: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

THEN WE CAN BE A BIT MORE LIKE HIM F..

FEARLESS

Page 20: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor

Thank You