Frontier Challenges: Black Boxes, Closed Ecosystems and Scale Overview The Challenges The Opportunities The Asks The Challenges we collectively face Overview The Challenges The Opportunities The Asks Challenge #0 Adversary capability and unconstrained behaviors Challenge #1 Ability to introspect closed device eco-systems Challenge #2 Volume of proprietary protocols Challenge #3 Cloud and the SaaS eco-systems and the ‘premium security feature’ revenue model Challenge #4 Need for after market capabilities as inbuilt not sufficient Challenge #5 Speed of digital transformation Challenge #6 Access to data in support of cyber as a science Challenge #7 Scaling Challenge #8 Imposing material cost on adversaries The Opportunities R&D, market and for differentiation Opportunity #0 Incentives and disincentives Opportunity #1 Applying market forces to unlock introspection and telemetry Opportunity #2 Further transparency on behalf of vendors and platform operators Opportunity #3 Active discovery tradecraft development Opportunity #4 Co-ordination on capability and tradecraft development Opportunity #5 Standard body involvement e.g. RFC 9424 Opportunity #6 Dumbfounding our adversaries The Ask Ask #0 Engage with NCSC – informing how we can support and work with you Ask #1 Feed us data and insights on where the pain and challenges are Ask #2 Build capability and capacity for threat discovery against all platforms Ask #3 Build capability and capacity for incident response on diverse platforms Ask #4 Help apply market forces directly and through clients Ask #5 Make the UK the most hostile place to target, infiltrate and dwell online Closing.. Closing Seatbelts aren’t a premium feature, and we shouldn’t tolerate it Closing Our tradecraft needs to evolve as systems do and increasingly at pace Closing We need to scale and ensure coverage Closing Our adversaries are capable and unconstrained Closing Source: https://dl.acm.org/doi/10.1145/3517745.3561452 Closing Thank you! @NCSC National Cyber Security Centre CyberHQ