Top Banner
Target. Hunt. Disrupt. WHAT’S NEXT IN CYBERSECURITY Ely Kahn, Co-Founder of Sqrrl
20

What's Next in Cybersecurity Policy

Apr 09, 2017

Download

Ely Kahn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What's Next in Cybersecurity Policy

Target. Hunt. Disrupt.

WHAT’S NEXT IN CYBERSECURITY

Ely Kahn, Co-Founder of Sqrrl

Page 2: What's Next in Cybersecurity Policy

AGENDA My Story What is Cybersecurity?

  Definition   Cyber Threats

Cybersecurity Policy   How is it made?   Hard problems in cybersecurity policy

© 2015 Sqrrl | All Rights Reserved 2

Page 3: What's Next in Cybersecurity Policy

MY STORY

© 2015 Sqrrl | All Rights Reserved

Harvard > Booz Allen > DHS > White House > Wharton > Sqrrl

3

Page 4: What's Next in Cybersecurity Policy

AGENDA My Story What is Cybersecurity?

  Definition   Cyber Threats

Cybersecurity Policy   How is it made?   Hard problems in cybersecurity policy

© 2015 Sqrrl | All Rights Reserved 4

Page 5: What's Next in Cybersecurity Policy

WHAT IS CYBERSECURITY?

“The security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.”

© 2015 Sqrrl | All Rights Reserved

Definition from the 2009 White House Cyberspace Policy Review

5

Page 6: What's Next in Cybersecurity Policy

BUT WHAT IS CYBERSPACE?

© 2015 Sqrrl | All Rights Reserved 6

Page 7: What's Next in Cybersecurity Policy

TYPES OF THREATS

© 2015 Sqrrl | All Rights Reserved 7 Source: Solon Group

Page 8: What's Next in Cybersecurity Policy

EVOLUTION OF THE THREAT

© 2015 Sqrrl | All Rights Reserved 8 Source: DoD

Page 9: What's Next in Cybersecurity Policy

APT ATTACK CYCLE

© 2015 Sqrrl | All Rights Reserved 9 Source: RSA

Page 10: What's Next in Cybersecurity Policy

TARGETED ATTACKS HAVE CHANGED THE GAME

10 Source: Battery Ventures © 2015 Sqrrl | All Rights Reserved

Page 11: What's Next in Cybersecurity Policy

CASE STUDY: STUXNET

© 2015 Sqrrl | All Rights Reserved 11 Source: Painedge

Page 12: What's Next in Cybersecurity Policy

AGENDA My Story What is Cybersecurity?

  Definition   Cyber Threats

Cybersecurity Policy   How is it made?   Hard problems in cybersecurity policy

© 2015 Sqrrl | All Rights Reserved 12

Page 13: What's Next in Cybersecurity Policy

NATIONAL SECURITY COUNCIL

© 2015 Sqrrl | All Rights Reserved 13

Nat’l Security Council

Deputies Committee

Principals Committee

Policy Coord. Committees

Outputs

•  Executive Orders •  Draft legislation •  National strategies and

plans •  Budget priorities •  Interagency programs •  Industry coordination

Page 14: What's Next in Cybersecurity Policy

CONGRESSIONAL LAWMAKING

© 2015 Sqrrl | All Rights Reserved 14 Source: Westlaw

Page 15: What's Next in Cybersecurity Policy

REGULATORY RULEMAKING

© 2015 Sqrrl | All Rights Reserved 15 Source: Langner

Page 16: What's Next in Cybersecurity Policy

STANDARDS DEVELOPMENT

© 2015 Sqrrl | All Rights Reserved 16

Page 17: What's Next in Cybersecurity Policy

HARD POLICY PROBLEM #1

© 2015 Sqrrl | All Rights Reserved

Information Sharing

17

Page 18: What's Next in Cybersecurity Policy

HARD POLICY PROBLEM #2

© 2015 Sqrrl | All Rights Reserved

Preventing cyber espionage

18

Page 19: What's Next in Cybersecurity Policy

HARD POLICY PROBLEM #3

© 2015 Sqrrl | All Rights Reserved

Balancing offense vs. defense

19

Page 20: What's Next in Cybersecurity Policy

HOW TO LEARN MORE?

My favorite online resources:   Dark Reading   SC Magazine   Politico   Passcode

Sqrrl.com   If you are interested in an internship, write me a blog

[email protected]

© 2015 Sqrrl | All Rights Reserved

Start reading, start writing

20