SlideShare a Scribd company logo
The Future of Cyber Security
Conference: April 6-7, 2016
Exhibit Hall: April 6-8, 2016
Sands Expo, Las Vegas, NV
Matthew Rosenquist
Cybersecurity Strategist
Intel Corp
“...If security breaks down, technology breaks down”
Brian Krebs
Noted Cybersecurity Reporter
Symbiotic Relationship: Physical and Cyber
Convergence of Cyber & Physical Security
Physical Cyber
Integration of technology blends the risks, requiring a cohesive approach
Convergence of Cyber & Physical Security
People and Technology
Expertise across these realms is highly valuable…
PROCESS
The Growing Cyber-Attack Surface
Innovation Drives Risk Convergence
New technology bridges the virtual and physical worlds
Protecting People, Property, and
Business Assets
Limited Resources and Budgets
Seeking an Optimal Balance of Risk/Cost
Aligned Goals and Challenges
Single most important factor
for success in security is
Leadership
Leaders will play a crucial role as security and
technology evolves
Chain Reactions Drive Cybersecurity Evolution…
Top Evolving Challenges in Cybersecurity
Public demands their governments protect
them from digital threats, fraud, and crimes,
yet not infringe upon privacy
Markets strive for more connectivity,
devices, applications, and services
Enterprise perspectives shift to accept the
reputation and market risks
Consumers expect security “their way”:
Safety with access anywhere to anything
Cybersecurity Expectations Increase1.
Result:
1. Expectations rise, but resources don’t keep
pace, causing opportunities for attackers
2. More regulations, raising security standards
3. Better policing, laws, and collaboration
4. Friction around technology privacy and
government access
5. Consumers respond economically to
penalize poor security from vendors
Cybersecurity Expectations Increase
Nation-State Cyber-Offense Affects Everyone
Broad adoption by many nations of
cyber-offense capabilities.
Governments incorporate cyber into their
defense apparatus with clear objectives
and deployable systems.
2.
i
29countries
Have formal cyber
warfare units
i
63countries
Use cyber tools for
surveillance
i
$19billion
US 2017 proposed
budget for cybersecurity
Nation-State Cyber-Offense Affects Everyone
Result:
1. Trickle-down effect gives advanced
technology to criminals and attackers
2. Reverse engineered code is reused by
other threats
3. Attackers don’t need to invest in
developing high-end exploits, instead
they harvest what governments create
Life Safety and Cybersecurity Intersect in
Products
Industrial and consumer products are
being connected to the internet
Billions of IoT devices gather data and
exert direct control
Risk of catastrophic impacts as our
reliance and trust increase
3.
Life Safety and Cybersecurity Intersect in
Products
Result:
1. Risks first emerge for the transportation,
healthcare, and industrial sectors
2. As IoT devices explode in number and
function, so will the potential misuse
3. Remote devices, cameras, and drones
become more concerning to safety and
privacy. Expect more regulations
Rise in Digital Theft and Fraud
More opportunities to steal, extort, and
commit fraud. Greed principle prevails
Attackers are organized, share methods
and tools
Threats not limited by geography
4.
i
~$450billion
Cyber-crime impact
globally
i
200%increase
In cyber-crime in
the last 5 years
i
32%reported
Organizations reporting
cyber-crime
Rise in Digital Theft and Fraud
Result:
1. More successful financial fraud and
theft
2. Number of attacks increase, externals
and internals, from across the globe
3. Higher cost incidents, millions-billion
dollar attacks
5.
Attackers are nimble, opportunistic,
cooperative, skilled, and relentless
Their motivation, resiliency, and creativity
drives great adaptability
Acceleration in their methods, tools, and
targets (technology, people, processes)
Attackers Evolve, Adapt, and Accelerate
i
$3trillion
Aggregate innovation impact of cyber-
risks by 2020
-McKinsey & World Economic Forum
i
$90trillion
Potential net economic benefit drained
from global GDP, worst case thru 2030
-Zurich & Atlantic Council
Result:
1. Dark markets and services grow to enable
2. New data breach targets emerge
3. Attackers drive down the technology
stack (data, apps, VM, OS, VMM, FW, HW)
4. Research follows quickly into new areas
of technology
5. Ransomware and “CEO email” fraud rises
6. Integrity attacks grow
Attackers Evolve, Adapt, and Accelerate
6.
Lack of qualified talent will greatly restrict
the growth and effectiveness of security
Academia is working to satiate demand,
but it will take time.
Lack of Talent Hinders the Industry
i
1.5-2million
Unfilled positions by
2017
i
12xgrowth
Compared to the overall
job market
i
70%understaffed
Organizations report
lack of staff
Result:
1. Salaries continue to rise until demand is
met
2. Headhunting and retention of top talent
is ruthlessly competitive
3. Leadership and technical roles in
greatest demand
4. Outsourcing to MSSP’s and security
consulting firms increases
Lack of Talent Hinders the Industry
Conclusion
Aligned goals and threats drive the convergence
of Physical and Cyber security
The rise of cyber represents risks and
opportunities
Attackers will target IoT. Physical and Cyber skill
sets are valuable in protecting assets
New threat vectors will emerge as advanced
technology is integrated
Leaders with insights to the future have the best
opportunity to align resources and be prepared
Question and Answer
The Opportunity to Lead is Here!
Conference: April 6-7, 2016
Exhibit Hall: April 6-8, 2016
Sands Expo, Las Vegas, NVMatthew Rosenquist
Cybersecurity Strategist
Intel Corp

More Related Content

PDF
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
PPTX
Banks and cybersecurity v2
PDF
How To Present Cyber Security To Senior Management Complete Deck
ODP
Cyber Security for Financial Institutions
PDF
Lessons Learned From the Yahoo! Hack
PPTX
cybersecurity strategy planning in the banking sector
PPTX
Target data breach presentation
PDF
Cybersecurity Roadmap Development for Executives
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Banks and cybersecurity v2
How To Present Cyber Security To Senior Management Complete Deck
Cyber Security for Financial Institutions
Lessons Learned From the Yahoo! Hack
cybersecurity strategy planning in the banking sector
Target data breach presentation
Cybersecurity Roadmap Development for Executives

What's hot (20)

PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPT
TJX Attack
PPTX
Cybersecurity Risk Management Program and Your Organization
PDF
Data Leakage Prevention (DLP)
PPT
Cybersecurity: Public Sector Threats and Responses
PPTX
Data breach presentation
PPTX
The Board and Cyber Security
PDF
Cyber threat intelligence ppt
PDF
Insights into cyber security and risk
 
PPTX
Cyber security in power sector
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Cybersecurity Basics.pptx
PPTX
IT governance and Information System Security
PPTX
Planning for security and security audit process
PDF
Cyber Threat Intelligence
PPTX
Automation of Information (Cyber) Security
PPTX
Cybersecurity Awareness Training
PDF
Next Generation Network: Security and Architecture
PDF
Intelligent security operations a staffing guide
PPSX
2 Security Architecture+Design
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
TJX Attack
Cybersecurity Risk Management Program and Your Organization
Data Leakage Prevention (DLP)
Cybersecurity: Public Sector Threats and Responses
Data breach presentation
The Board and Cyber Security
Cyber threat intelligence ppt
Insights into cyber security and risk
 
Cyber security in power sector
Rothke secure360 building a security operations center (soc)
Cybersecurity Basics.pptx
IT governance and Information System Security
Planning for security and security audit process
Cyber Threat Intelligence
Automation of Information (Cyber) Security
Cybersecurity Awareness Training
Next Generation Network: Security and Architecture
Intelligent security operations a staffing guide
2 Security Architecture+Design
Ad

Similar to CSE 2016 Future of Cyber Security by Matthew Rosenquist (20)

PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
DOCX
The Future of Cybersecurity: Trends and Opportunities
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
PDF
2014 the future evolution of cybersecurity
PDF
Microsoft Digital Defense Report 2024 .pdf
PDF
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
PDF
Volume2 chapter1 security
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
PDF
Combating Cybersecurity Challenges with Advanced Analytics
PDF
1. security 20 20 - ebook-vol2
PDF
Pivotal Role of HR in Cybersecurity
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PPTX
7 Cybersecurity Statistics You Need to Know in 2023.pptx
PPTX
Matt_Cyber Security Core Deck September 2016.pptx
DOCX
Trends_in_my_profession(revised)
PDF
PDF
Cybersecurity | Risk. Impact. Innovations.
PDF
Dell Technologies Cyber Security playbook
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
The Future of Cybersecurity: Trends and Opportunities
Future of Cybersecurity 2016 - M.Rosenquist
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
2014 the future evolution of cybersecurity
Microsoft Digital Defense Report 2024 .pdf
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
Volume2 chapter1 security
CII Whitepaper India Cyber Risk & Resilience Review 2018
Combating Cybersecurity Challenges with Advanced Analytics
1. security 20 20 - ebook-vol2
Pivotal Role of HR in Cybersecurity
The 10 Fastest Growing Cyber Security Companies of 2017
7 Cybersecurity Statistics You Need to Know in 2023.pptx
Matt_Cyber Security Core Deck September 2016.pptx
Trends_in_my_profession(revised)
Cybersecurity | Risk. Impact. Innovations.
Dell Technologies Cyber Security playbook
Ad

More from Matthew Rosenquist (20)

PDF
Improving Healthcare Risk Assessments to Maximize Security Budgets
PDF
Six Scenarios How Russia May Use Nukes.pdf
PDF
Top Cyber News Magazine - Oct 2022
PDF
2022 Cybersecurity Predictions
PDF
McAfee Labs 2017 Threats Predictions
PDF
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
PDF
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
PDF
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
PDF
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
PDF
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
True Cost of Data Breaches
PDF
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
PDF
2015 August - Intel Security McAfee Labs Quarterly Threat Report
PDF
The Future of Cyber Security - Matthew Rosenquist
PDF
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
PDF
Mergers and Acquisition Security - Areas of Interest
Improving Healthcare Risk Assessments to Maximize Security Budgets
Six Scenarios How Russia May Use Nukes.pdf
Top Cyber News Magazine - Oct 2022
2022 Cybersecurity Predictions
McAfee Labs 2017 Threats Predictions
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
2017 K12 Educators Security Briefing - Matthew Rosenquist
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Securing the Cloud by Matthew Rosenquist 2016
True Cost of Data Breaches
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
2015 August - Intel Security McAfee Labs Quarterly Threat Report
The Future of Cyber Security - Matthew Rosenquist
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
Mergers and Acquisition Security - Areas of Interest

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

CSE 2016 Future of Cyber Security by Matthew Rosenquist

  • 1. The Future of Cyber Security Conference: April 6-7, 2016 Exhibit Hall: April 6-8, 2016 Sands Expo, Las Vegas, NV Matthew Rosenquist Cybersecurity Strategist Intel Corp
  • 2. “...If security breaks down, technology breaks down” Brian Krebs Noted Cybersecurity Reporter Symbiotic Relationship: Physical and Cyber
  • 3. Convergence of Cyber & Physical Security Physical Cyber Integration of technology blends the risks, requiring a cohesive approach
  • 4. Convergence of Cyber & Physical Security People and Technology Expertise across these realms is highly valuable… PROCESS
  • 6. Innovation Drives Risk Convergence New technology bridges the virtual and physical worlds
  • 7. Protecting People, Property, and Business Assets Limited Resources and Budgets Seeking an Optimal Balance of Risk/Cost Aligned Goals and Challenges
  • 8. Single most important factor for success in security is Leadership Leaders will play a crucial role as security and technology evolves
  • 9. Chain Reactions Drive Cybersecurity Evolution…
  • 10. Top Evolving Challenges in Cybersecurity
  • 11. Public demands their governments protect them from digital threats, fraud, and crimes, yet not infringe upon privacy Markets strive for more connectivity, devices, applications, and services Enterprise perspectives shift to accept the reputation and market risks Consumers expect security “their way”: Safety with access anywhere to anything Cybersecurity Expectations Increase1.
  • 12. Result: 1. Expectations rise, but resources don’t keep pace, causing opportunities for attackers 2. More regulations, raising security standards 3. Better policing, laws, and collaboration 4. Friction around technology privacy and government access 5. Consumers respond economically to penalize poor security from vendors Cybersecurity Expectations Increase
  • 13. Nation-State Cyber-Offense Affects Everyone Broad adoption by many nations of cyber-offense capabilities. Governments incorporate cyber into their defense apparatus with clear objectives and deployable systems. 2. i 29countries Have formal cyber warfare units i 63countries Use cyber tools for surveillance i $19billion US 2017 proposed budget for cybersecurity
  • 14. Nation-State Cyber-Offense Affects Everyone Result: 1. Trickle-down effect gives advanced technology to criminals and attackers 2. Reverse engineered code is reused by other threats 3. Attackers don’t need to invest in developing high-end exploits, instead they harvest what governments create
  • 15. Life Safety and Cybersecurity Intersect in Products Industrial and consumer products are being connected to the internet Billions of IoT devices gather data and exert direct control Risk of catastrophic impacts as our reliance and trust increase 3.
  • 16. Life Safety and Cybersecurity Intersect in Products Result: 1. Risks first emerge for the transportation, healthcare, and industrial sectors 2. As IoT devices explode in number and function, so will the potential misuse 3. Remote devices, cameras, and drones become more concerning to safety and privacy. Expect more regulations
  • 17. Rise in Digital Theft and Fraud More opportunities to steal, extort, and commit fraud. Greed principle prevails Attackers are organized, share methods and tools Threats not limited by geography 4. i ~$450billion Cyber-crime impact globally i 200%increase In cyber-crime in the last 5 years i 32%reported Organizations reporting cyber-crime
  • 18. Rise in Digital Theft and Fraud Result: 1. More successful financial fraud and theft 2. Number of attacks increase, externals and internals, from across the globe 3. Higher cost incidents, millions-billion dollar attacks
  • 19. 5. Attackers are nimble, opportunistic, cooperative, skilled, and relentless Their motivation, resiliency, and creativity drives great adaptability Acceleration in their methods, tools, and targets (technology, people, processes) Attackers Evolve, Adapt, and Accelerate i $3trillion Aggregate innovation impact of cyber- risks by 2020 -McKinsey & World Economic Forum i $90trillion Potential net economic benefit drained from global GDP, worst case thru 2030 -Zurich & Atlantic Council
  • 20. Result: 1. Dark markets and services grow to enable 2. New data breach targets emerge 3. Attackers drive down the technology stack (data, apps, VM, OS, VMM, FW, HW) 4. Research follows quickly into new areas of technology 5. Ransomware and “CEO email” fraud rises 6. Integrity attacks grow Attackers Evolve, Adapt, and Accelerate
  • 21. 6. Lack of qualified talent will greatly restrict the growth and effectiveness of security Academia is working to satiate demand, but it will take time. Lack of Talent Hinders the Industry i 1.5-2million Unfilled positions by 2017 i 12xgrowth Compared to the overall job market i 70%understaffed Organizations report lack of staff
  • 22. Result: 1. Salaries continue to rise until demand is met 2. Headhunting and retention of top talent is ruthlessly competitive 3. Leadership and technical roles in greatest demand 4. Outsourcing to MSSP’s and security consulting firms increases Lack of Talent Hinders the Industry
  • 23. Conclusion Aligned goals and threats drive the convergence of Physical and Cyber security The rise of cyber represents risks and opportunities Attackers will target IoT. Physical and Cyber skill sets are valuable in protecting assets New threat vectors will emerge as advanced technology is integrated Leaders with insights to the future have the best opportunity to align resources and be prepared
  • 24. Question and Answer The Opportunity to Lead is Here! Conference: April 6-7, 2016 Exhibit Hall: April 6-8, 2016 Sands Expo, Las Vegas, NVMatthew Rosenquist Cybersecurity Strategist Intel Corp