Digital transformation and global cybersecurity policies Kaja Ciglic, Senior Cybersecurity Strategist, Microsoft Operating in a transforming world Few relative certainties Technological evolution Every single industry will be digitally remastered Boosting business agility Delighting with instant-on capacity customers with personalized experiences and service Redesigning business processes Increasing employee productivity with ubiquitous access Productivity Insights Platform Instantly scale business for global reach Converting capital expenses to operating expenses Social Acquiring new customers through new channels Redeploying IT talent onto more strategic projects Entering new markets by innovating with digital products and services Instantly scaling to meet demand Speeding application development Technological evolution Data will be king 70% 50bn of CIOs will embrace a cloud-first strategy in 2016 Mobile and IoT connected devices become ubiquitous Platform diversity 50x Data volumes surge Persistence of threat New actors Cybercrime Military & political espionage Economic espionage Cyber warfare Persistence of threat Evolution of attacks 2003-2004 Script Kiddies BLASTER, SLAMMER Motive: Mischief Volume and Impact Persistence of threat Evolution of attacks 2005-PRESENT Organized Crime 2003-2004 Script Kiddies BLASTER, SLAMMER Motive: Mischief RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Persistence of threat Evolution of attacks 2012 - Beyond 2005-PRESENT Organized Crime 2003-2004 Script Kiddies BLASTER, SLAMMER Motive: Mischief RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Nation States, Activists, Terror Groups BRAZEN, COMPLEX, PERSISTENT Motives: IP Theft, Damage, Disruption Government response Risk and dependence causes government action “…one thing is clear, you cannot keep people safe in the real world unless you can keep them safe on the Internet.” - Brad Smith, President, Microsoft Government response Governments acting PROTECTOR USER 50+ Countries with Defensive Capabilities 95 Countries Developing Legislative Initiatives 37 Countries with Declared Offensive Capabilities 70 Countries with National Cybersecurity Strategies Rising International Insecurity EXPLOITER CREATOR Innovation at Risk Increasing Regulatory Pressure Government response Global activity Policy activity 35 Geographic Spread: Policy Activity 30 25 20 15 18% 48% 34% EMEA 5 0 APAC 22 10 29 26 20 8 1 Americas Series 1 19 Government response Policy topics at play Enterprise Security and Compliance Security of Government Systems Government response Emerging cybersecurity consensus Common values and outcomes are emerging and solidifying among public and private sector stakeholders! Better understanding of threats Agile and effective risk management practices Resilient and adaptive infrastructure and network security Foundation of trusted information sharing and collaboration
© Copyright 2024 Paperzz