1 of 17

Cyber Security, Employment & Climate Concerns

PAST, PRESENT AND POSSIBLE FUTURE

2 of 17

“the best way to predict the future is to invent it”

  • ALAN KAY, XEROXPARC
    • Graphical Interface Computing (Pre Windows & Mac)
    • Object Oriented Programing, and personal computing

3 of 17

A Brief History in Time

  • ARPANET (4 node university internet & DOD weapon project): Dec 5th 1969
  • UNIX Epoch: Jan 1st, 1970 , Thompson & Ritchie edition 1 1971
  • Computer system administrator, network administrator professional roles: ~ 1977 – 1983
  • Certified Information Systems Auditor: 1978
  • Technology certifications: Novell CNE 1989, Microsoft MCSE 1992, Cisco CCIE 1993
  • Certified Information Systems Security Professional: 1994
  • First CISO role: CitiBank Steve Katz 1995
  • First ISAC : Financial services ISAC 1999
  • Certified Ethical Hacker: 2003

4 of 17

A Brief History in Qualifications

  • Computer system administrator, network administrator professional roles: ~ 1977 – 1983
  • - Comp Sci, engineering, math or physics degree, (Thompson & Ritchie – MSc & PHD)
  • Technology certifications: Novell CNE 1989, Microsoft MCSE 1992, Cisco CCIE 1993
  • - On the job training and willingness to sit multiple practical examples – no degree required
  • Certified Information Systems Security Professional: 1994
  • - 5 years in the industry and pass a 6-hour 225 question exam,
  • Certified Ethical Hacker: 2003
  • - Take the training and write an exam, no degree, no job requirements

5 of 17

A Brief History of Hacking

  • Assumed Secure:
  • 1903, ‘secure’ wireless discrediting of Marconi
  • 1954 & 1960 phone freaking using toy whistles, (Davey Crockett & Captain Crunch -> Blue box)
  • Money:
  • 1834 French bond traders encoded market movement in telegraph character correction
  • 1994 Citibank cash management vuln, 10 million
  • 2024 Estimated 9.5 Trillion USD cybercrime costs:
  • - ransom & stolen money, lost productivity, IP theft, identity theft, …. Forensics, new security

6 of 17

“Cyber Security �is full!”

Medium post received attention

Intended point entry level jobs

Conflated with post covid slump

Correctly ID’d industry half truth

7 of 17

Climate Change Relevance?

  • Carbon Credit Market: Money exchanged raises the potential for fraud
  • C-Quest Capital - $100 million fraud case falsifying data to verify emissions reductions
  • Amberg Corp – 25 charges providing false information, unqualified auditors

  • Unregulated voluntary market challenges:
  • Lack of standardization exaggerated benefit claims difficult to monitor
  • Higher global “net-zero” demand increases providers – multi-billion industry

8 of 17

Gaps & Potential Solutions

  • Standards, Baselines & Auditing:
  • Data modeling & tracking - as complex as the carbon options
  • Monitoring difficulties:
  • IIOT sensors & embedded devices, (Solar, SBC, Satellite & 5G, Cloud analytics)
  • GIS, thermal and arial drone footage analysis, (Multi-modal AI)
  • Commercial transparency:
  • Registries with SOC II and MFA,
  • Block chain recording of payments and credits

9 of 17

Humble Beginnings�

UCLA, Standford, Santa Barbara & University of Utah 1969

TCP/IP added 1983

HTML markup 1989-1990

~2.8 million users

~100 million users 1998

~5.5 billion 2024

Sources: CHM, OurWorldinData,Org - Ritchie et al

10 of 17

“turbine to toaster”�

~25% GHG – Electric generation

~15% GHG by 2030 via digitalization (WEF)reduction

Consumption Reduction Benefits

Lighting 15% & falling globally

Smart Grid slower & unequal

~1 billion electric, gas, water

Sources: Inside Lighting, IOT Analytics

11 of 17

Eco Driven Cyber Threats

  • Attack Surface Expansion
  • Bidirectional & mesh communications
  • Controlling or monitoring physical equipment
  • “IT” Components:
  • OS & software bugs
  • Authn & Authz
  • Remote admin reqs.
  • Sources: IET, IEEE

12 of 17

Eco Driven Cyber threats

  • Legacy infrastructure increasing target:
  • Protocols control & speed focused “insecure by design”
  • AIC triad, reliable operations primary goal
  • Current security approach “after the fact”
  • Old Tech, New Tech Blend:
  • Utilities adopting “green tech” also retain legacy ops
  • High reliance on remote access

13 of 17

Eco Driven Cyber threats

  • Common supply chain:
  • Devices used to control current industrial processes often also used in green tech
  • Software, hardware vulnerabilities identifiable via reversing, injectable into commercial stream
  • Personal Compromise – Activity Tracking
  • Green tech often closer to people’s daily lives
  • Bi-directional comms collect & potentially expose usage patterns

14 of 17

Possible Future Employment Ops

  • Equipment Design, Solution Implementation:
  • Software engineering skills, application development, big data design & analysis
  • Policy Creation & Enforcement:
  • Laws & regulation can lag 5-10 years behind industry
  • Auditing and compliance reporting
  • Machine Learning:
  • Global sized data problem != Excel
  • Prediction and model maintenance

15 of 17

Recommended Skills

  • Cyber Security Conceptual & Technical Knowledge:
  • Integrate security concepts into all aspects of a technology solution
  • Understand use cases and dependencies/requirements for emerging technology ( IT skills)
  • Risk Management:
  • Methodical, defendable identification of credible threats & impacts
  • Analyze mitigations proposed, prioritize actions (foundational business skills)
  • Communications:
  • Written and verbal, (briefs, fulsome reports, presentations, learning modules) (business coms class)
  • Multi-constituent comfort, IE, engineers, executives, operational staff, possible HR …

16 of 17

Questions?

17 of 17

Thanks & Contact Info

  • Organizers for inviting me,
  • You for listening