Collective Ingenuity against Cyber Attacks

Download Collective Ingenuity against Cyber Attacks

Post on 16-Apr-2017

9.096 views

Category:

Business

0 download

Embed Size (px)

TRANSCRIPT

The Power of Collective Ingenuity Omar AbboshChief Strategy Officer

Copyright 2016 Accenture All rights reserved.#

PAUL VIRILIO

The invention of the ship was also the invention of the shipwreck.

Copyright 2016 Accenture All rights reserved.2

Copyright 2016 Accenture All rights reserved.#From script: To take Virilios ship metaphor further, security professionals are putting in measures, best practices, mapping systems, lighthouses and beacons in order to reap the benefits of new innovations while managing potentially catastrophic risks. Organizations are working tirelessly to avoid being like the Titanic. You certainly see it. And as we work with clients, we see it first hand, every single day, all across the globe.

2

$3,000$2,000$1,000We are spending.A lot.Total annual venture capital funding in cybersecurity increased 76%, to $3.34 billion, in 2015.

$183199819992000200120022003200420052006200720082009201020112012201320142015Global cybersecurity market to increase to $125 billion by 2020 up from $84 billion in 2015.

Investments in cybersecurity startups grew by 235% over past five years, reaching all-time high of $3.8 billion in 2015.

45% expect to invest in threat intelligence in the next 12 18 months. Copyright 2016 Accenture All rights reserved.3Gartner, Forecast: Information Security, Worldwide, 2014-2020, 1Q16 Update, May 10, 2016CB Insights, Mega-Rounds To Cybersecurity Help Push Funding To New High In 2015. January 27, 2016ESG Threat Intelligence Research Project, Jon Oltsik, May 2015

Copyright 2016 Accenture All rights reserved.#Source info: As funding from venture capitalists tapered off in the fourth quarter of 2015,investment in the cybersecurity sector continued to boom, Cat Zakrzewski reports for Dow Jones VentureWire. Venture capitalists invested $675.43 million in the fourth quarter of 2015, up from $522.41 million in the same quarter a year before, according to data from Dow JonesVentureSource. Total annual venture capital funding in cybersecurity increased 76%, to $3.34 billion, in 2015.Synlogichassecured $40 million in Series B financingto advance its own synthetic biotic treatments for the rare conditions urea cycle disorder and phenylketonuria. New investorOrbiMed HealthCare Fund Managementled the financing, which also included new backerDeerfield Managementand founding investorsAtlas VentureandNew Enterprise Associates.ZeaKal Inc., a San Diego-based agricultural tech startup,has raised $5.3 million in Series B venture fundingin a round led byFinistere Ventures, withMiddleland Capitaland other family office investors participating, for its GMO technology to make soybeans and rice more-efficient crops, for starters.CensorNet Ltd., a venture backed cloud security company, said it has agreedto acquire SMS Passcode, a multifactor authentication startup.Mobify Research and Development Inc.has raised$10 million in Series A financing to scale its mobile customer engagement technology. Munich-basedActon Capital Partnersled the round, with participation by undisclosed individual investors.Palantir Technologies Inc.is acquiringKimono Labs Inc. Terms of the acquisition werent disclosed. Kimono Labs offers a tool to visualize and pull data from websites and apps.

The bad guys are still winning.A lot.Copyright 2016 Accenture All rights reserved.4The average total cost of a single data breach rose 23 percent to$3.79 millionCyberattacks could cost up to $90 trillionby 2030IBM/Ponemon, 2015 Cost of Data Breach Study, May 2015Atlantic Council and the Zurich Insurance, Risk Nexus, 2015

Copyright 2016 Accenture All rights reserved.#Ukraine power grid attack: As many as 80,000 residents in western Ukraine lost power for six hours on December 23. Cybersecurity firms SANS ICS and iSight Partners have attributed the blackout to Russian hacking group Sandworm and its malicious software, BlackEnergy 3. This might have been the first use of cyber as a weapon with kinetic effects during an ongoing conflict.Water treatment system attack: Verizon reported that hackers breached a water utility and manipulated systems responsible for water treatment and flow control. The hackers altered settings related to water flow and the amount of chemicals used to treat the water. Investigators said they discovered four separate connections over a 60-day period. Verizon pointed out that the attackers likely had little knowledge of how the flow control system worked and that the attack could have had far more serious consequences if hackers had more time and more knowledge of the targeted industrial control systems (ICS).Attack on Japanese nuclear center: Computer hackers infiltrated a server installed at a Japanese facility thatoversees the handling of plutonium and other nuclear materials. No data atthe facility was compromised, but hackers used the server as a relay pointin a cyber-attack on some other system.

Solving the security problem50+large securityvendors today

200+new security startups are funded each year

Copyright 2016 Accenture All rights reserved.5TechCrunch, Cockroaches Versus Unicorns: The Golden Age Of Cybersecurity Startups, January 6, 2016

Copyright 2016 Accenture All rights reserved.#From script: My hypothesis is that two things are happening:Theres been huge growth in advisory services around compliance and global risk and compliance (GRC). Weve also experienced a tremendous increase in a whole series of point solutions and technologies. Yet, neither one nor the other, nor the two together, have solved the problem. Pure advisory services dont do it, a proliferation of point solutions that is coming at us faster than we can even evaluate them doesnt do it.

SOURCE: In January 2016, Momentum Partners published theCybersecurity Market Review (Q4 2015). Their CyberScape map depicts the complexity and vastness of the Cyber Security industry.

A necessary course correctiona collective ingenuityCopyright 2016 Accenture All rights reserved.6

Copyright 2016 Accenture All rights reserved.#From script: So how can we take control of this security crisis that is controlling us?We have two choices. Either we collaborate to harden our defenses and innovate or we stay stuck in the perfect storm created by the emerging technologies and our attackers ability to use them against us. Riding out the storm is clearly NOT an option. Add strengthen our industries here so it previews all three points below.

1Build industry-specific resilience

Copyright 2016 Accenture All rights reserved.7

Copyright 2016 Accenture All rights reserved.#

2Develop ahealthy business immune system

Copyright 2016 Accenture All rights reserved.8

Copyright 2016 Accenture All rights reserved.#

is notYour attackera one or a zeroCopyright 2016 Accenture All rights reserved.9

Copyright 2016 Accenture All rights reserved.#

3Drive innovation in a connected ecosystem

Copyright 2016 Accenture All rights reserved.10

Copyright 2016 Accenture All rights reserved.#

Nadav ZafrirCo-founder and Chief Executive OfficerTeam8Copyright 2016 Accenture All rights reserved.11

Copyright 2016 Accenture All rights reserved.#

Out innovate the attackers.Make the good guys a force to be reckoned with.Copyright 2016 Accenture All rights reserved.12

Copyright 2016 Accenture All rights reserved.#

Thank youCopyright 2016 Accenture All rights reserved.13

Copyright 2016 Accenture All rights reserved.#