The Technology Horizon & Cyber SecurityEISIC 2015Ollie Whitehouse, Technical Director
Agenda
The technology direction
The technology horizon
Challenges threat intelligence will face
Challenges enterprise cyber security will face
2
4
Cyber security challenge – part 1
5
Cyber security challenge – part 2
6
Cyber security challenge – part 3.a
7
Cyber security challenge – part 3.b
8
Intelligence agencies
9
Intelligence agenciesOrganised criminals
10
Individuals, small groups
12
Commercial espionage
13
Horizons… you choose
14
Horizons… you choose
15
Horizons… you choose
16
Horizons… you choose
17
Horizons… you choose
18
Legacy Systems Coming On-line
Legacy systems brought on-line
19
Data Lakes
Data lakes
20
Everything Connected
Everything connected
21
Everything Connected
Everything connected
22
De-perimeterization
23
Technology & Data Fragmentation
24
High-end business customization
25
Ubiquitous Encryption
Ubiquitous encryption
26
Software everywhere and in every guise
27
No Perimeters
Hurdles to threat intelligence
28
resilient cyber security as it relates to their data, estate, users and supply chain
Business needs
29
Not just a tech problem
30
Not just a tech problem
31
machine learning is on the cusp of wide and useful adoption in cyber security …
… threat actors will adapt
Beyond These
32
as very large enterprises get better at defence the focus on insider threat will
increase
Insider threat
33
EuropeManchester - Head Office
Amsterdam
Cambridge
Copenhagen
Cheltenham
Edinburgh
Glasgow
Leatherhead
London
Luxembourg
Munich
Zurich
AustraliaSydney
North AmericaAtlanta
Austin
Chicago
New York
San Francisco
Seattle
Sunnyvale
Ollie [email protected]