SlideShare a Scribd company logo
MatthewRosenquist
CybersecurityStrategist
Technologyconvergenceisdrivingchange.
Protectionwillevolvetoincludedigital
security,physicalsafety,andpersonalprivacy.
2
3
Thecyberworld
isimpactingthephysicalworld
Innewwaysthatundermine
securityandtrust
Industrial
 Electricitygridtakenoffline
 Nationaloilinterestattacked
 Life-safetyfailuresatindustrial
facilities
 Supplychaincompromises
CyberImpactingthePhysicalWorld
4
Transportation
 Automobilesremotelycontrolledby
threatresearchers
 Airplanesystemshackedby
passengersmid-flight
 Underminingautonomousand
assisteddriving
CyberImpactingthePhysicalWorld
5
Physicalsecurity
 IPCameraimagefeedshijacked
 Biometricauthenticationsystem
fooled
 Smartlockshacked
 Dronesasattackplatforms
CyberImpactingthePhysicalWorld
6
Privacy
 Healthcarerecordstheft
 Phoneconversationsurveillance
 Emailaccountsbreached
 Loginaccountscompromised
 Images,video,andmessagesstolen
CyberImpactingthePhysicalWorld
7
ConsumerIoT
 ‘Smart’homedevicebotnets
 Securityandsafetysystemshacked
 Personalandhomedevices
manipulated
 Ransomwarelockingdevices
CyberImpactingthePhysicalWorld
8
Finance
 SWIFTtransactionmanipulation
 Accountingsystemcompromises
 ATM‘Jack-potting’
 Accountaccessandsiphoning
 Taxandidentityfraud
CyberImpactingthePhysicalWorld
9
Healthcare
 Emergencycaresystems
 Implantabledevicevulnerabilities
 Medicinedeliverysystems
 Remotemedicalcare
CyberImpactingthePhysicalWorld
10
Government
 Governance/votingmanipulation
 Asymmetricmilitaryattacks
 Malware/ransomwareofagencies
 Politicalinfluencingandpolicy
enforcement
CyberImpactingthePhysicalWorld
11
TransformationComplexity
12
ThePhysicalWorld DigitalSystems
Source: Intel SecuritySource: MechanicalEngineering.com
13
TECHNOLOGYISATOOL
BENEFITSOFDIGITALTRANSFORMATIONisaccompanied
byequitable CYBERriskS
TechInnovation&AdoptionDrivesRisks
Newtechnologybridgesthevirtualandphysicalworlds,
toconnectandenrichpeopleslives
14
CyberandPhysicalDomainsCollide
15
16
AsTECHNOLOGYscales
potentialthreats,common
riskandvaluetradeoffs
aretransformed
ChainReactionsDriveCybersecurityEvolution…
17
25+Million
Applications
Connected and creating 50x
the volume of data
50-200BillionDevices
Connected to the Internet
$6trillion
Cyber-crime impact
globally by 2021
$3–$90trillion
Aggregate innovation impact of
cyber-risks
400k+New Malware/Day
630 million unique
samples of malware exist today
$75billion
Rise of ransomware
becomes a multi-billion
dollar problem
4+BillionUsersOnline
Up from 3 billion today
50Trillion
Gigabytes
Amount of data being
created
AWorldofTargetswithIncreasedValue
18
10Million
Self-driving cars on the road
100kCustomersLost
fromasingledatabreach
Customer abandonment goes up
19
AttackersAdvantage
Threatsgrowinsize,capability,
Andbenefitfromalargerattack
Surfaceforgreatergains
Dante'sInfernoofCybersecurityImpacts
DenialofService
(Availability)
DataTheft&
Exposure
(Confidentiality)
Monitor&
Manipulate
(Integrity)
Security Competency
Attacker Innovation
Attacks evolve and
increase in severity based
upon deeper adoption and
reliance
Own&Obliterate
20
MarketExpectationschange
Life-Safetywillbethecatalyst
Foratippingpointwhichwillincrease
thescopeandrelevanceofsecurity
22
Expectationsofprotectionexpand
Digitalsecurity
+
Physicalsafety
+
Personalprivacy
Relevancetomarketsincrease
 DemandtoaddressAccelerationofGreaterRisks
 Increasedregulatorycomplianceandtechnologystandards
 Securitybecomesa
forethoughtinsteadof
anafterthought
 Expectationsincreaseand
blendacrossCyber/physical
24
RelationshipsDriveChange
Technology
Threats
Markets
Security
Markets expect
Technology to be
integrated with
Security to protect
from Threats
Securityrisksandopportunities
OpportunitiesontheRise
Security is more relevant
Becomes a stronger purchase criteria
More budget and funding opportunities
Newmarketsemerge
27
Newindustrytrends
DigitalSecurity
• Smart ‘things’ new and old will need protection
• Trustworthy technology is a differentiator
PhysicalSafety
• Asset protection from cyber related damage and theft
• Life-safety concerns will be a tipping point!
PersonalPrivacy
• User information, activities, and personal data
• Surveillance data: video, voice, biometrics, location
RisksandOpportunitiesrisefor
thesecurityindustry
29
Security and Network Training
Tracks
SIAEducationbringsinsightsandknowledge
13
Unmanned Systems: Drones
and Robots
Threat Landscape and
Defensive Countermeasures
Video Surveillance
Physical Security and Safety
Connected Security Exposition:
People, Processes, and Technology
Threats, Trends and Protective
Strategies
Access and ID Management
Dealer, Installer, and Integrator
Technology
Cybersecurity and Security
Industry Insights
…Areyouprepared?
Technologyconvergenceisdrivingchange.
RelevancewillriseforProtectionsofdigital
security,physicalsafety,andpersonalprivacy.
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenquist v8

More Related Content

PDF
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
PDF
SCSJPA App Recommendations
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
PDF
The Future of Cyber Security - Matthew Rosenquist
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
2014 the future evolution of cybersecurity
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
PDF
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
SCSJPA App Recommendations
2017 InfraGard Atlanta Conference - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
2014 the future evolution of cybersecurity
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...

Similar to How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenquist v8 (20)

PDF
Power Plants Security Webinar Presentation
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PPTX
Cybersecurity in the Era of IoT
PDF
Top 10 Cybersecurity Predictions for 2015
PDF
Citrix security booklet
PDF
Cyber Security in Manufacturing
PPTX
Emerging threats in cyber security: anticipating and mitigating future risks....
PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PDF
Why is cyber security a disruption in the digital economy
PDF
2022 Cybersecurity Predictions
PPTX
Future-proofing Supply Chain against emerging Cyber-physical Threats
PPTX
The Future of Cybersecurity courses.pptx
PDF
Francesca Bosco, Le nuove sfide della cyber security
PDF
Cybersecurity | Risk. Impact. Innovations.
PDF
Cyber security
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PDF
State of Cyber: Views from an Industry Insider
PDF
Pivotal Role of HR in Cybersecurity
Power Plants Security Webinar Presentation
2017 K12 Educators Security Briefing - Matthew Rosenquist
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
Future of Cybersecurity 2016 - M.Rosenquist
Cybersecurity in the Era of IoT
Top 10 Cybersecurity Predictions for 2015
Citrix security booklet
Cyber Security in Manufacturing
Emerging threats in cyber security: anticipating and mitigating future risks....
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
Why is cyber security a disruption in the digital economy
2022 Cybersecurity Predictions
Future-proofing Supply Chain against emerging Cyber-physical Threats
The Future of Cybersecurity courses.pptx
Francesca Bosco, Le nuove sfide della cyber security
Cybersecurity | Risk. Impact. Innovations.
Cyber security
IRJET- Cybersecurity: The Agenda for the Decade
State of Cyber: Views from an Industry Insider
Pivotal Role of HR in Cybersecurity
Ad

More from Matthew Rosenquist (17)

PDF
Improving Healthcare Risk Assessments to Maximize Security Budgets
PDF
Six Scenarios How Russia May Use Nukes.pdf
PDF
Top Cyber News Magazine - Oct 2022
PDF
McAfee Labs 2017 Threats Predictions
PDF
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
PDF
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
True Cost of Data Breaches
PDF
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
PDF
2015 August - Intel Security McAfee Labs Quarterly Threat Report
PDF
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
PDF
Mergers and Acquisition Security - Areas of Interest
PDF
2015 Global APT Summit Matthew Rosenquist
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Improving Healthcare Risk Assessments to Maximize Security Budgets
Six Scenarios How Russia May Use Nukes.pdf
Top Cyber News Magazine - Oct 2022
McAfee Labs 2017 Threats Predictions
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Securing the Cloud by Matthew Rosenquist 2016
True Cost of Data Breaches
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
Mergers and Acquisition Security - Areas of Interest
2015 Global APT Summit Matthew Rosenquist
Strategic Leadership for Managing Evolving Cybersecurity Risks
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
sap open course for s4hana steps from ECC to s4
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenquist v8