Vous êtes sur la page 1sur 35

CYBER SECURITY

INNOVATION

AN URGENT CALL
FOR CYBER

ME
Carlos Valderrama
Over 15 years in Cyber Security,
Computer Forensics and Cyber
Intelligence
Co-founder -> Cyber Security Hub
Barcelona

Founder and VP Engineering -> Innovating: Crime


and fraud detection/prevention platform

Managing Director -> Helping to find the most


disruptive Cyber Security startups

CURRENT SITUATION
Whats happening out there?

CURRENT SITUATION
Cyber Security Incidents reported to the
U.S. CERT

CURRENT SITUATION

CURRENT SITUATION
ATMs, POS, Banking Trojans, contactless pickpockets,
etc, etc, etc.

CURRENT SITUATION
Its clear that the security procedures utilized by companies today (big and small) is
completely failing and with the huge growth of IoT products (from smart fridges
to Barbie dolls) of which many are buggy from the factory, criminals are
not only compromising our data but also that of our family

CURRENT SITUATION
IoT
devices

CURRENT SITUATION
Privacy and Cyber
Espionage

Marketing
State-sponsored
Competitiveness
Crime/Terrorism

CURRENT SITUATION
Terrorism
Air trac control systems, railways, power stations, water plants, cars, etc,
etc.

CURRENT SITUATION
Cyber terrorism
Premeditated, politically motivated attack against information, computer systems,
computer programs, and data which results in violence against non-combatant
targets by sub-national groups or clandestine agents."
U.S. Federal Bureau of
Investigation

CURRENT SITUATION
Crypto War 2.0 - Apple Case
We have great respect for the professionals at the FBI, and w e believe their intentions
are good. Up to this point, w e have done everything that is both within our power and
within the law to help them. But now the U.S. government has asked us for something
w e simply d o not have, and something w e consider too dangerous to create. They
have asked us to build a backdoor to the iPhone.

REAL TIME ATTACKS

CURRENT SITUATION
The
battle

CURRENT SITUATION
Why are the bad guys
winning?

CURRENT MODEL
New challenges, old methods

CURRENT MODEL

Complexity is the enemy of security


Complexity is expensive
Simplicity is the ultimate sophistication Leonardo Davinci
Simplicity is the complexity resolved Constantin
Brancusi

CYBER SECURITY DISRUPTION


Digital
disruption

CYBER SECURITY DISRUPTION


You know the Cyber Security Disruption is not happening
when

Telco providers
Power plants
Banks
Computers
Smartphones
Pacemakers
Email providers
Browsers
Operating Systems
Social Networks
Cars
Drones

>
>

Everyone and everything is


getting hacked!

We cant detect it and prevent


it

CYBER SECURITY
Innovation is the
answer

CYBER SECURITY
Citizens

Companies
Corporate network,
corporate servers and
computers, Internet Services,
Internet of Things, Online
Banking, BYOD, Online
Services

Internet of Things, Personal


computers, Online services,
Cars, Smart city technology,
Mobile phones, Apps,
Internet Services, Online
Banking, Drones

CYBER
SECURITY

Government
Government network,
Government servers and
computers, Government
data, Public records,
eGovernment, Online
services, International aairs

Public
Infrastructu
re
Critical infrastructure, smart
cities, Cars, Internet of
Things and connect ed
devices, trac lights,
Security Cameras, Public
transport infrastructure

THE
MARKET
Cyber Security

WHY CYBER SECURTIY?


In 2014 venture capitalists
invested a record amount in
privately held companies in the
Cyber Security industry

Investors are pouring billions


into Cyber Security firms

The Cyber Security


Market will be
worth
$170.21 Billion by
2020

Cyber Security startup Tanium


raising new VC at $2.5 billion
valuation

In 2014, companies reported


42.8 million detected attacks
worldwide, a 48% YoY increase

$3.3 billion invested in Cyber


Security by VCs in 2015
VCs chasing Rising Cyber
Security Spending

THE MOVERS & SHAKERS


Some of the leading European startups making a change in
the Cyber Security sector

Makers of the
Blackphone. Silent Circle
provides multiplatform
secure communication
services for mobile
devices and desktop

Develops continuous
authentication and
verification technology
that provides identity
and access
management solutions

The easy browser


extension that hides
your IP address,
encrypts your trac
and protects your
privacy

Scytl develops secure


electronic voting and
electoral modernization
solutions for the public
and private sectors

Telegram is a cloudbased instant messaging


service.
Telegram messages are
heavily encrypted and
can self-destruct

The world leader in


Enterprise Immune
System technology for
cyber security

Silobreaker is a data
analytics company
specialising in cyber
security and risk
intelligence.

Provides cyber
situational awareness
that helps organizations
protect against cyber
attacks and loss of
intellectual property

THE MAP

For more detail, the table can be found

BIG CYBER SECURITY EXITS

INVESTMENT HISTORY

INVESTMENT HISTORY

SPENDING HISTORY
In his fiscal 2017 budget proposal, Obama asked for $19 billion for
cyber security across the U.S. government, an increase of $5 billion over
this year (REUTERS)

THE
NECESSITY
Players

THE BIG PICTURE

University/Education

Cyber
Security
Community
Corporations

Government
Startups

Niche Investors/
Accelerators

Men
Women

CYBER HEROES NEEDED

Lean startup

Fellow founders

Funding

Legal

Sales

Marketing/Growth
Hacking

Cyber Security

Operations

CYBER HEROES NEEDED

JOIN US
We want
you!

THANK
YOU!
carlos@hackcradle.com

Vous aimerez peut-être aussi