Digital Transformation and global cybersecurity policies

Digital transformation and global
cybersecurity policies
Kaja Ciglic, Senior Cybersecurity Strategist,
Microsoft
Operating in a
transforming
world
Few relative certainties
Technological
evolution
Every single industry will be digitally remastered
Boosting business agility Delighting
with instant-on capacity customers with
personalized
experiences
and service
Redesigning
business processes
Increasing employee
productivity with
ubiquitous access
Productivity
Insights
Platform
Instantly scale
business for global
reach
Converting
capital expenses
to operating
expenses
Social
Acquiring new
customers
through new
channels
Redeploying IT talent
onto more strategic
projects
Entering new
markets by
innovating with
digital products
and services
Instantly
scaling to
meet
demand
Speeding
application
development
Technological
evolution
Data will be king
70%
50bn
of CIOs will embrace
a cloud-first strategy
in 2016
Mobile and IoT connected
devices become
ubiquitous
Platform diversity
50x
Data volumes surge
Persistence
of threat
New actors
Cybercrime
Military &
political
espionage
Economic
espionage
Cyber
warfare
Persistence
of threat
Evolution of attacks
2003-2004
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
Volume and Impact
Persistence
of threat
Evolution of attacks
2005-PRESENT
Organized Crime
2003-2004
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Profit
Persistence
of threat
Evolution of attacks
2012 - Beyond
2005-PRESENT
Organized Crime
2003-2004
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Profit
Nation States,
Activists, Terror
Groups
BRAZEN,
COMPLEX,
PERSISTENT
Motives:
IP Theft,
Damage,
Disruption
Government
response
Risk and dependence causes government action
“…one thing is clear, you cannot keep people safe in the real world unless you
can keep them safe on the Internet.”
- Brad Smith, President, Microsoft
Government
response
Governments acting
PROTECTOR
USER
50+ Countries with
Defensive Capabilities
95 Countries
Developing Legislative
Initiatives
37 Countries with
Declared Offensive
Capabilities
70 Countries with
National Cybersecurity
Strategies
Rising International
Insecurity
EXPLOITER
CREATOR
Innovation at Risk
Increasing
Regulatory
Pressure
Government
response
Global activity
Policy activity
35
Geographic Spread:
Policy Activity
30
25
20
15
18%
48%
34%
EMEA
5
0
APAC
22
10
29
26
20
8
1
Americas
Series 1
19
Government
response
Policy topics at play
Enterprise Security and Compliance
Security of Government Systems
Government
response
Emerging cybersecurity consensus
Common values and outcomes are emerging and solidifying
among public and private sector stakeholders!
Better
understanding
of threats
Agile and
effective risk
management
practices
Resilient and
adaptive
infrastructure
and network
security
Foundation of trusted information sharing and collaboration