Uploaded by partnership

Ollie Whitehouse - Frontier Challenges Black Boxes, Closed Ecosystems and Scale

advertisement
Frontier Challenges: Black Boxes,
Closed Ecosystems and Scale
Overview
The Challenges
The Opportunities
The Asks
The Challenges
we collectively face
Overview
The Challenges
The Opportunities
The Asks
Challenge #0
Adversary capability and unconstrained behaviors
Challenge #1
Ability to introspect closed device eco-systems
Challenge #2
Volume of proprietary protocols
Challenge #3
Cloud and the SaaS eco-systems and the ‘premium security feature’ revenue model
Challenge #4
Need for after market capabilities as inbuilt not sufficient
Challenge #5
Speed of digital transformation
Challenge #6
Access to data in support of cyber as a science
Challenge #7
Scaling
Challenge #8
Imposing material cost on adversaries
The Opportunities
R&D, market and for differentiation
Opportunity #0
Incentives and disincentives
Opportunity #1
Applying market forces to unlock introspection and telemetry
Opportunity #2
Further transparency on behalf of vendors and platform operators
Opportunity #3
Active discovery tradecraft development
Opportunity #4
Co-ordination on capability and tradecraft development
Opportunity #5
Standard body involvement e.g. RFC 9424
Opportunity #6
Dumbfounding our adversaries
The Ask
Ask #0
Engage with NCSC – informing how we can support and work with you
Ask #1
Feed us data and insights on where the pain and challenges are
Ask #2
Build capability and capacity for threat discovery against all platforms
Ask #3
Build capability and capacity for incident response on diverse platforms
Ask #4
Help apply market forces directly and through clients
Ask #5
Make the UK the most hostile place to target, infiltrate and dwell online
Closing..
Closing
Seatbelts aren’t a premium feature, and we shouldn’t tolerate it
Closing
Our tradecraft needs to evolve as systems do and increasingly at pace
Closing
We need to scale and ensure coverage
Closing
Our adversaries are capable and unconstrained
Closing
Source: https://dl.acm.org/doi/10.1145/3517745.3561452
Closing
Thank you!
@NCSC
National Cyber Security Centre
CyberHQ
Download