With known adversaries from foreign governments to domestic surveillance the security challenge has changed from one of proper configurations and operational procedures to on of countering targeted attacks. In this presentation Stiennon describes the world’s best practices for thwarting sophisticated attackers.
How to create and staff a cyber defense team. Continuous monitoring coupled with security analytics is an additional required layer of defense. Lockheed’s cyber kill chain is the right approach, for now. Autonomous attacks will arise soon and the tools needed to thwart them are not even on the horizon.
The Revolution in Military Affairs Has Given Rise To The Real Threat of Cyberwar
Expanding on the topic of his Master’s dissertation at King’s College London Stiennon relates the history of the Revolution in Military Affairs within the major military organizations of the world and how the rush to Network Centric Warfare has laid the groundwork for cyber attacks and the incorporation of cyber weapons into each military’s battle plans.
Military preparedness is focusing on cyber offense to the detriment of defense. The rapid adaption of Network Centric Warfare has left most militaries vulnerable. The next war will be multi-domain, led by cyber.
The rapid rise of surveillance by the NSA and other government spy agencies poses a new threat to every IT security department. Gone are the days when hackers, cyber criminals, or even espionage by foreign governments were the major driver of IT security investments. Since the 2013 revelations that the NSA had successfully executed on a mission of “information dominance” and “collect everything,” the new driver is massive data collection and how to counter it. Stiennon predicts that the IT security industry will respond quickly to this new threat with increased investments in encryption, key management, and the defenses required to protect the means of encryption. This will mean a tenfold increase, to $632 billion, in security spending by 2023.
IT Security spending is already growing at 24% a year. Four times what most analysts predict. Employment in IT security will grow tenfold The NSA is a threat that will be countered by a revolution in IT security technology.
The three tenants of IT Risk Management are asset identification, value assessment, and vulnerability management. In this provocative presentation Stiennon demonstrates that all three are impossible and therefore time, money, and effort expended on risk management are misplaced. He advocates for a threat centric approach to IT security.
Take aways:
Most risk management programs are impossible to achieve and they do nothing to protect an organization from targeted attacks. Only by incorporating threat management can an organization counter advanced targeted attacks. In battle situations, leaders focus on threats, not risks.
very smooth experience, thanks!
Synopsys
- Oct 29 2019
We are happy to assist you with your interest in booking a speaker or celebrity for your event, your organization, and the type of talent you would like to secure, and an agent will be in touch shortly.
Fill out the form below to or call us at 1-800-698-2536 if need immediate assistance.
We respond to most inquiries within 4 hours. Under special circumstances, it may take up to 24 hours.
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.