Open - AdamDell.com

Download Report

Transcript Open - AdamDell.com

Technology & Business:
Where is Technology Having the
Biggest Impact on Business Today?
Lecture 2
Spring 2014
Prof. Dell
Let’s Start With UT Law Student Market
What technologies have most changed your life?
What NEW technologies do you think will change your life?
What do you wish you could do?
Now, the Broader Market…a Few Areas
Energy
- Thin Film Solar
- Electric cars (Tesla)
- Fracking
Cyber Security
- Organized Crime
- Threat detection
- Active Defense
Cloud Computing
- Servers on Demand (Amazon Web Services)
- Virtualization (VM Ware)
- Software as a Service (Gmail, Salesforce.com)
Big Data
- Analytics
- Measuring everything
Smart Devices
- iOS / Android
- The Internet of Things
Cyber Security
How many of you have been hacked in some way?
Do you feel comfortable about where your digital
footprint lives? And how it’s kept secure?
Cyber Security: Organized Crime
What is the largest type of organized crime today?
What is Phishing?
Phishing is the act of attempting to acquire information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy entity in an
electronic communication
Cyber Security: Organized Crime
Cyber Security: Organized Crime
Cyber Security: Hacking
James Dolan, CEO of Cablevision:
“All we have are movies and TV shows pumping through our
pipes. We are hacked 600 times per day, on average. What do
they hope to get?”
Obama’s July 2013 claim that hacking costs of $1 trillion
dollars, may be a bit high, but it’s directionally correct.
Cyber Security
Here is the crazy part:
Vast majority of Fortune 500 companies have no understanding
of the degree of their vulnerability:
- Human error
- Malicious employees
- Spies
- Concerted attacks
- Fraud
Cyber Security
There are three categories of companies:
Those that don’t know they are screwed.
Those that know they are screwed.
Those that think they are secure, but are screwed.
What is the one thing they ALL have in common?
Cyber Security: Current Approaches
Sophisticated companies employ a variety of techniques:
Intrusion Detection
Incident Response
Vulnerability Assessment
Malware and Spam
Endpoint Threat Detection
Active monitoring
White Lists / Black Lists
Honeypots
Disappearing browsers
Sandboxing
Cyber Security: Results
For those organizations (mostly financial institutions and
highly specialized technology companies) that have the staff
and resources
To monitor and fight the cat and mouse game in real time, they
have a fighting chance at mitigating loss.
They will never stop it.
Everyone else is screwed.
Cyber Security: Huawei (China’s Cisco)
Huawei’s business model:
Steal, sell, repeat.
Cisco spends roughly $6 billion a year in R&D.
The Chinese government sponsors hackers who steal Cisco’s IP.
The Chinese government dictates that vast portions of China’s
telecommunications infrastructure utilize Huawei technology.
Cyber Security: Mandiant
Active Defense?
If someone you know, who has robbed you before, is running
toward you pointing a gun at you, with the intent of robbing
you again, what are you legally permitted to do?
If someone you know, who has robbed you before, is pointing
their servers at your IP and is beginning to spin up their efforts
to rob you again, what are you legally permitted to do?
Cyber Security: Class Exercise
How would you architect a public policy to deal with cyber security?
What would you allow?
What control is left in a world where the Web is architected to enable
Wikileaks? What should we do differently? Is the genie out of the bottle?
Shouldn't the government be protecting companies / our economic interests
like they protect our economics interests in oil rich regions?
Should we individually or as a nation be more aggressive?
Cyber Security: Class Exercise
Government’s Efforts:
The Comprehensive National Cybersecurity
Initiative
•To establish a front line of defense against today’s immediate threats by
creating or enhancing shared situational awareness of network
vulnerabilities, threats, and events within the Federal Government—and
ultimately with state, local, and tribal governments and private sector
partners—and the ability to act quickly to reduce our current vulnerabilities
and prevent intrusions.
•To defend against the full spectrum of threats by enhancing U.S.
counterintelligence capabilities and increasing the security of the supply
chain for key information technologies.
•To strengthen the future cybersecurity environment by expanding cyber
education; coordinating and redirecting research and development efforts
across the Federal Government; and working to define and develop
strategies to deter hostile or malicious activity in cyberspace.
Cyber Security .Gov = Really Active Offense
NSA / DOD
Proactive, Pre-emptive Operations Group: Mission to conduct
Aggressive, Proactive, Pre-emptive Operations to interdict and disrupt
threats.
They use Psychological Operations, Managed Information Dissemination,
Precision Targeting, Information Warfare Operations, Signal Intelligence.
The proactive defense strategy is meant to improves information collection
by stimulating reactions of the threat agents, provide strike options and to
enhance operational preparation of the real or virtual battle space.
NSA spends hundreds of millions tracking and attacking known bad actors,
using everything in their arsenal: drones, cyber attacks, hired killers.
What do you we think about:
A government’s ability to protect it’s secrets?
The effectiveness of security solutions to protect large companies?
What this impact of stolen IP has on businesses?
A random doctor in Nebraska being a victim of phishing from Croatia?
Wikileaks? (large amounts of data can be share anonymously?)
What can you buy with BitCoins? Do we think it ‘works’?
And it’s not likely to improve…
- Companies used to have secure corporate networks accessible only
by a VPN and a PC.
- Today corporate data is accessible from phones, tablets, the web,
PCs.
- More points of access and more opportunities for human error
- Bad guys are increasing in number.
- The existing efforts to stop hacking fail 95-98% of the time.
Big Opportunities: Focus on Security
FireEye is a global network security company that provides automated
threat forensics and dynamic malware protection against advanced
cyber threats, such as advanced persistent threats and phishing.
Market Cap:
Revenue:
EBITDA:
Net Income:
4.42B
135.97M
-107.67M
-130.70M
Smart Devices – Internet of Things
If you walk into a Macy’s they know:
- Whether you are a spender
- How many times you’ve been to the store
- What kind of cell phone you have
- What kinds of items you are interested in
They can get all of this without speaking to you.
How?
Smart Devices – Internet of Things
Now imagine a world of connected devices.
Where your cell phone, car, watch, credit card, etc.
Are all connected, all being “read” in some way.
What will be possible?
What kind of business can you imagine with this
kind of information?
Smart Devices – Twilio
There are companies like Twilio
That make $ stitching together the fabric of
communications online.
Can you imagine a business that does this in a world
of connected devices?
What would that look like?
Big Data
Virtually everything is digital in some fashion.
Let’s take a look at your law school experience..
Big Data
How many times do you login to FB each day?
How many times do you login to UT Direct each day?
How much time do you spend looking a course material?
How many times do you email fellow students? Teachers?
How quickly do teachers respond to your emails?
Big Data: They know
A new set of low cost technologies, namely Hadoop MapReduce (don’t worry
about what exactly this is),
Enable vast amounts (multi-terrabytes) of data to be instantaneously analyzed
Allowing insights to be drawn about behavior and outcomes.
In healthcare, education, engineering, social media, advertising
Viirtually everything….
Big Data: Education
Please welcome
David Kil
Chief Data Scientist
Civitas Learning