Darktrace CEO Says Cyber Security Is A Global Arms Race

Even by today’s standards, it was an audacious heist. Last year, hackers in Finland used a large decorative fish tank located inside a US casino to crack into its computer system and target high-rollers.

The stakes were high. Their aim was to use the fish tank, which was connected to the internet via the casino’s internal network, to find its database of big-spending gamblers and pinch their details as they continued to count their chips. If it sounds bizarre, the plan was in fact ingeniously simple.

For a-time it succeeded and criminals made off with about 10GB of data. It probably would never have been detected, had the breach not been spotted as soon as artificial intelligence was installed.

This is one of Nicole Eagan’s (pictured) favourite stories, and the chief executive of cyber security firm Darktrace has seen it all. “We have seen attacks on internet-connected coffee machines, brand new buildings that are being built with tech-enabled heating and air conditioning systems,” she says.

“We have seen attacks through garage door systems. There is endless creativity to get in the network.”

Darktrace, one of the UK’s greatest technology success stories, specialises in blocking unusual cyber-attacks, as well as the run of the mill email phishing expeditions. It is one of Britain’s most high-profile technology “unicorns”, worth an estimated $1.7bn (£1.29bn) after a recent funding round.

The fast-growing company, which offers cyber security services enhanced by artificial intelligence, has profited from soaring demand following major attacks such as Wannacry.

Darktrace technology identifies and blocks attacks with minimal human involvement. Referrals from existing clients had pushed the company forward, she says.

Yet the company had relatively humble origins in Cambridge, when in 2013 a motley crew of university mathematicians teamed up with former intelligence executives and a handful of ex-staff from former software company Autonomy.

Eagan herself has plenty of energy too. The 54-year-old New Jersey-born computer whizz went to Montclair State University when she was just 16 to do a joint degree in computer science and marketing.  After leaving university, Eagan worked for five years on Wall Street, where she built computer systems for some of the largest banks, before being poached by software giant Oracle and moving to California, where she has been based ever since.

“We hire a lot of college graduates – they are brand new to business and brand new to Darktrace. If you look at the make-up of the company it’s very different.”

The company has added investors such as European venture capital fund Vitruvian Partners, Insight Venture Partners and Summit Partners, KKR, Samsung and Softbank in subsequent cash-raising efforts. The investment goes into hiring and growing the business, Eagan says.

Darktrace also has an army of graduates from Cambridge Universtity, where the company based its R&D HQ, 10 minutes from the railway station.

The company is naturally secretive: among its ranks are former hackers and spies. Visitors’ mobile phones and bags are confiscated upon entering the building. In London, glass-walled meeting rooms are named after famous fictional spies such as James Bond.

The team is constantly perfecting an AI product inspired by the human body by launching new algorithms, Eagan explains. Like the immune system, the machine learns how to respond to the attack and protect the system without supervision and could remove or at least reduce the need for in-house cyber security experts. 

From her San Francisco office, Eagan plots the company’s next moves. This year alone, Darktrace opened offices in Singapore, Mexico and Sao Paulo, and expanded its New York and Cambridge presence. Eagan’s vision for the future is not battling against attacks from hackers in darkened rooms hiding behind self-made malware, but against artificial intelligence capable of far greater damage. For years, the company has geared up to exactly that.

“We had a very early recognition that cyber security was becoming a global arms race, no longer fought from nation state to nation state, but from nation state to corporate networks. Not just credit card credentials, but also IP,” she says.

“The next evolution of the attack is when they hackers use AI as part of the attack. It is going to be a lot stealthier and faster-moving.”

The Telegraph:

You Might Also Read:

Darktrace Describe The Alarming Future AI Attack Scenario

« MI6 Chief Says Cyber Brings ‘potentially existential challenge’
US Marines Turn To Artificial Intelligence To Better Deploy Troops »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.