38
Strategic Trends in Cybersecurity – and Security Jarno Limnéll Professor, Cybersecurity, Aalto University Adjunct Professor , Tampere University of Technology VP, Cybersecurity, Insta Group Ltd. Doctor of Military Science @ JarnoLim

Keynote Jarno Limnéll DSSITSEC2016

Embed Size (px)

Citation preview

Page 1: Keynote Jarno Limnéll DSSITSEC2016

Strategic Trends in Cybersecurity – and Security

Jarno LimnéllProfessor, Cybersecurity, Aalto UniversityAdjunct Professor, Tampere University of TechnologyVP, Cybersecurity, Insta Group Ltd.Doctor of Military Science@JarnoLim

Page 2: Keynote Jarno Limnéll DSSITSEC2016
Page 3: Keynote Jarno Limnéll DSSITSEC2016

Security is an Enabler

Page 4: Keynote Jarno Limnéll DSSITSEC2016

Five Strategic Trends in Cybersecurity

Page 5: Keynote Jarno Limnéll DSSITSEC2016

The human source is the most valuable resource in

cybersecurity and the value of talented individuals is increasing.

Page 6: Keynote Jarno Limnéll DSSITSEC2016

“If you’re interested in the opportunity to make a difference in defending your nation, if you’re interested

in the opportunity to work with a bunch of motivated men and women...”

Page 7: Keynote Jarno Limnéll DSSITSEC2016

Russian Defense Minister Sergey Shoigu: Ministry had started a “big headhunt.”

Alternative to prison Russia sometimes offer to hackers convicted

of cybercrimes working for FSB

Page 8: Keynote Jarno Limnéll DSSITSEC2016
Page 9: Keynote Jarno Limnéll DSSITSEC2016

MIT Technology Review Custom conducted an online survey of IT and business executives and managers across a broad range of industries in February 2016.

Page 10: Keynote Jarno Limnéll DSSITSEC2016
Page 11: Keynote Jarno Limnéll DSSITSEC2016

The most valuable skills for cybersecurity career in next years may not be a focus in

specific technology, but ability to understand the big picture as

strategic thinkers.

Page 12: Keynote Jarno Limnéll DSSITSEC2016

Trend 1:Cyber arms race for

talented people.

Page 13: Keynote Jarno Limnéll DSSITSEC2016

“An artificial intelligence president could be truly altruistic. It wouldn’t be susceptible to lobbyists,

special interest groups or personal desires.”

Page 14: Keynote Jarno Limnéll DSSITSEC2016
Page 15: Keynote Jarno Limnéll DSSITSEC2016

Smart = Exploitable, Vulnerable

Security by Design

The Culture of Responsibility

Page 16: Keynote Jarno Limnéll DSSITSEC2016

…weapons that can identify targets and make decisions.”

Can a machine be trusted with lethal force?

Page 17: Keynote Jarno Limnéll DSSITSEC2016

Advances in technology pose difficult moral questions for humanity.

It is not clear who is responsible for providing answers.

Page 18: Keynote Jarno Limnéll DSSITSEC2016

The ethical implications,

The importance of Digital Ethics

We also need considerwhat better not to digitize.

Page 19: Keynote Jarno Limnéll DSSITSEC2016

How much control of our lives do we want to give over to machines

– and to the corporations that build and operate them?

Page 20: Keynote Jarno Limnéll DSSITSEC2016

Trend 2:The new era in

technology needs strong emphasis on ethics,

integral part of security.

Page 21: Keynote Jarno Limnéll DSSITSEC2016

“Cyberattack on German steel plant caused significant damage”

KINETIC CYBER

“A cyber attack on the French television network TV5 Monde”

FALSE FLAG ATTACKS

“The Dukes: 7 Years of Russian Cyber-Espionage”

STRATEGIC CYBER ESPIONAGE “Hackers breach the Warsaw Stock Exchange”

CRITICAL INFRASTRUCTURE

States are testing the boundaries of the cyberbattlefield.

Page 22: Keynote Jarno Limnéll DSSITSEC2016

according to new details from an extensive

investigation into the hack, they were

skilled and stealthy strategists who

carefully planned their assault over many

months, first doing reconnaissance to

study the networks and siphon operator

credentials, then launching a synchronized

assault in a well

Coordinated December 2015 attack on the Ukrainian electrical grid was clearly an attack on critical national infrastructure.

Cybersabotage emerging

Cyber component in all wars and crisis

Page 23: Keynote Jarno Limnéll DSSITSEC2016
Page 24: Keynote Jarno Limnéll DSSITSEC2016

New ways to utilize cyberspace appearing fast.What next is the real question.

Increasing importance to understand cyberspace as a political domain.

Issues related to cyberspace and its uses have vaulted into the highest realm of high politics.

Page 25: Keynote Jarno Limnéll DSSITSEC2016

“Proportional response”

Page 26: Keynote Jarno Limnéll DSSITSEC2016

Cyber operations suit well to the political-military hybrid environment

The adversary is usually difficult to locate

Less political risks, cyberpolitics on early stage

Cyber op´s in international law still a grey area

Often conducted by non-state actors, deniability

The role of non-kinetic actions in today´s war

Jarno Limnéll

Page 27: Keynote Jarno Limnéll DSSITSEC2016

GU

IDA

NC

E

POLITICS

Cyber should not be separated from the political and strategic context.

Page 28: Keynote Jarno Limnéll DSSITSEC2016

Trend 3:The world is moving towards a

greater strategic use of cyber capabilities.

Cyberpolitics needed.

Page 29: Keynote Jarno Limnéll DSSITSEC2016

New Normal in Security:

Speed of ChangeUnpredictable Instability

Digital-Physical Integration

Page 30: Keynote Jarno Limnéll DSSITSEC2016

How to integratecybersecurity to security.

Page 31: Keynote Jarno Limnéll DSSITSEC2016

Imp

act

Likelihood

Page 32: Keynote Jarno Limnéll DSSITSEC2016
Page 33: Keynote Jarno Limnéll DSSITSEC2016

There are relatively few “cyber only” operations

Page 34: Keynote Jarno Limnéll DSSITSEC2016
Page 35: Keynote Jarno Limnéll DSSITSEC2016

Trend 4:The line between

physical and digital security is blurring.

Page 36: Keynote Jarno Limnéll DSSITSEC2016

TODAY WE CONCENTRATE TOO MUCH WHAT WE KNOW AND OBSERVE.

WE SHOULD THINK MORE CYBER METHODS WHICH HAVE NOT BEEN USED YET – OR

WHICH WE DO NOT EVEN KNOW.

Page 37: Keynote Jarno Limnéll DSSITSEC2016

Trend 5:

?

Page 38: Keynote Jarno Limnéll DSSITSEC2016

[email protected]: @JarnoLim