cyber trust: cornerstone of a digital world

8
Andrea Biraghi Security & Information Systems Division Managing Director Cyber trust: cornerstone of a digital world Cyber trust: cornerstone of a digital world

Upload: leonardo

Post on 15-Apr-2017

162 views

Category:

Presentations & Public Speaking


2 download

TRANSCRIPT

Page 1: Cyber trust: cornerstone of a digital world

Andrea Biraghi Security & Information Systems Division Managing Director

Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world

Page 2: Cyber trust: cornerstone of a digital world

2

4BUsers 2019

5.9BSmartphone

Connections 2020

44 ZBData zettabytes in

2020

24.4BIP-connecteddevices 2019

200BIoT Devices 2019

159 B$Global public cloud market

2020

168 EBExabytes/month

in IP traffic in 2019

0Downtime &

Latency request

In 5 years

Explosion of hyperconnectivity

Cyber security and physical security will be increasingly connected to each other.

Society will work largely with the help of the cyber world.

Need to protect complex, networked, engineered physical/cyber/virtual systems.

Page 3: Cyber trust: cornerstone of a digital world

3

The future

Physical and Digital worlds overlapping at an

unprecedented rate

Biotechnologies, blockchain,

nanotechnologies, robotics, 3d

printing, cyber-physical systems,

massive usage of augmented

reality and artificial intelligence.

Societies will be a networked cyber

physical ecosystem of services,

systems, people, information

Information Technology, Connectivity and

Robotics convergence

Low investments, limited risks, disruptive effects.

Whatever the objective, the cyber option will be

more and more appealing for hostile entities.

Page 4: Cyber trust: cornerstone of a digital world

4

Some signals

NATO declared Cyber the 5th Battlespace domain

Digital Trust is first inhibitor factor to unchain UE Digital Single Market

Cyber is a main point in most of Nations, Board Room & CISO Agendas

Connected everything fuels the emergence of

new attack vectors

Impacted sectors

TransportAutonomous systems, Situational awareness

SecurityDrone technology, Weapon systems,

Situational awareness

EnergySmart grid and innovative

EMS/DMS

HealthcareSmart medical devices,

Big data. robotics

BankingBlockchain technology

Question

How to manage this complexity for scenarios

like Terrorism, Cybercrime, Immigration Flows and Border control, Protection and Resilience

of Transportation, Communications, Energy,

Manufacturing?

How to keep TRUST?

Cyber evolution: from silos to ecosystems

Page 5: Cyber trust: cornerstone of a digital world

5

How to keep trust

Build a Trust Relationships Circles among us as Security System Integrators, the Cyber Community and all the Customers.

This is driven by the need to cooperate with a new set of stakeholders, providers and end-users, with technological assets becoming suddenly correlated.

Cyber CommunityPut in place a real community of security and blue light stakeholders.

Security ProcessFollow and somehow lead the Customers in measuring their exposure and building their security processes and capabilities.

Cyber Technology PartnersManage a liquid ecosystem of technologies and Vendors.Concentrate the developments on core technologies.

Security ServiceShift from buying technologies to capabilities aaS. Keep the pace of the evolution.

Page 6: Cyber trust: cornerstone of a digital world

6

Leonardo:the Security System Integrator in the new ecosystem

Manageoptimize and reduce

intervention and damages,through integrated

platforms for ″Security and Resilience″

Manageoptimize and reduce

intervention and damages,through integrated

platforms for ″Security and Resilience″

ProtectExploit cyber-

physical security systems, strictly

cooperating

ProtectExploit cyber-

physical security systems, strictly

cooperating

PreventUse intelligence systems

and information from sensors anticipatory

signals

PreventUse intelligence systems

and information from sensors anticipatory

signals

How to keep leaderships?

Improving Customer incident response capability

Developing Cyber Threat Intelligence, essential for information security

Specializing feeds per domain, integrating HUMan Intelligence

Page 7: Cyber trust: cornerstone of a digital world

7

Developing technologies like Automation to react to a cyber attack, Machine Learning, Prediction models, and Human Intelligence integration

Integrating cyber in products like Cyber Warfare, RPAS - Drone technology, Situational awareness, Unmanned Vehicle Control, Avionics – Traffic Control Security, Energy Grids

Improving our capabilities best in class, 2 SOC/CSIRT (in Italy & UK), 1 NOC, 1 intelligence Operation Centre for Threat Intelligence, OSINT and dark web analysis

Being a solid cornerstone of the Cyber Security trust ecosystem

Our plan: target European Excellence In Cyber Industry

Integrating security approach and portfolio: physical + wireless + cyber

Protecting wireless sensor networks, cloud computingenvironments, Machine-to-Machine communicationsystems, robotics applications, and drones (UAVs).

Having contributed to start the ECSO Security

association, Leonardo will support the creation of an

Italian chapter as national public-private partnership

Page 8: Cyber trust: cornerstone of a digital world

THANK YOU FOR YOUR ATTENTION

Andrea BiraghiManaging DirectorSecurity & Information Systems DivisionLeonardo SpA