Slide 1

Slide 1 text

1 EXTENDING PHYSICAL AND IT SECURITY INTO THE AIRSPACE

Slide 2

Slide 2 text

2 Agenda • The Evolution of Drones • Why Protecting Your Lower Airspace is so Challenging • The Steps to Mitigation

Slide 3

Slide 3 text

The Evolution Of Drones

Slide 4

Slide 4 text

4 2002 – 2014: From CIA to Consumers 2002: CIA Drones Expensive, complex, powerful 2014: Basic consumer drones Inexpensive, simple, rudimentary

Slide 5

Slide 5 text

5 2014 – 2017: Dramatic Growth in Drone Capabilities Advanced consumer drones Inexpensive, powerful, easy to operate Extensive business applications Survey, delivery, imaging, disaster relief, etc.

Slide 6

Slide 6 text

6 2017 & Beyond: Explosive Drone Industry Growth • Millions of drones already in the air • Growing at over 30% year-over-year • Estimated $11B market by 2020 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 4,000,000 2013 2014 2015 2016 2017 Drone Units Sold

Slide 7

Slide 7 text

Why Protecting Your Airspace is so Challenging

Slide 8

Slide 8 text

8 Greatest Challenge: No design standards

Slide 9

Slide 9 text

9 1 $500 Drones are disrupting a $400B Security Market

Slide 10

Slide 10 text

1 0 1 Sabotage of critical parts of the infrastructure, such as ventilation/cooling Terrorist Drone

Slide 11

Slide 11 text

1 1 1 Photos and videos of sensitive areas Surveillance Drone

Slide 12

Slide 12 text

1 2 1 Your SOC monitors the infrastructure and exteriors, but the airspace is wide open Hacker Drone

Slide 13

Slide 13 text

1 3 Hacking Incidents

Slide 14

Slide 14 text

1 4 Hacking Incidents

Slide 15

Slide 15 text

1 5 Hacking Incidents

Slide 16

Slide 16 text

1 6 Hacking Incidents

Slide 17

Slide 17 text

The Steps to Mitigation

Slide 18

Slide 18 text

1 8 1) New manufacturers and types of drones entering the market every day and no standards around transmission protocols, form factor, capabilities, etc. 2) A variety of different environments need to be protected…plants, corporate buildings, R&D facilities, datacenters, executives 3) Many different threats need to be protected against: Physical threats, Surveillance/Privacy threats, and Cyber threats Drone security closely resembles cyber security, therefore the key to success is SOFTWARE Framework for a solution – 3 challenges that must be addressed

Slide 19

Slide 19 text

1 9 Example Architecture for Detection and Mitigation

Slide 20

Slide 20 text

2 0 Step 1: Threat/Vulnerability Assessment • Goal: Data collection • How often, what type, repeat offenders? • Mitigation Preparation • Threat Profile • Components: RF/WiFi Sensor • Foundational sensor • Highly accurate • Drone profile (Type, MAC Address, time in airspace, signal strength/proximity) • Outcome: • Complete airspace visibility

Slide 21

Slide 21 text

2 1 DRONE ALERT DRONE: Phantom 4 SSID: PHANTOM3_0af963 MAC: 60:60:1f:0a:f9:63 RSSI: -78 dBm RETURNING: 2x

Slide 22

Slide 22 text

2 2 Step 2: Situational Awareness and Process • Goal: Defensive processes, situational awareness • Internal security/Police cooperation • Find/prosecute pilot, shut off WiFi, close curtains • Components: Video, Directional RF, Radar • Flight path of drone • Outcome: • Defend your asset

Slide 23

Slide 23 text

2 3 Step 3: Adapt To Dissolve The Threat • Hacking/ Corporate Espionage: • Disable Wifi • Disable Bluetooth • Deploy Security Resources to commandeer a landed drone • Surveillance/ Corporate Espionage: • Change/Update Security Protocols • Move/cover high valued goods • Alert Authorities • Flood Lights • Fog Bombs & Trigger Curtains • Ultimate Mitigation : • Legal Prosecution (finding pilot) • Via forensic Evidence

Slide 24

Slide 24 text

2 4 Directional Jamming Omni Directional Jamming Lethal Mitigation

Slide 25

Slide 25 text

2 5 Future Proofing Your Security

Slide 26

Slide 26 text

2 6 About Dedrone High-Growth Technology Company • Founded in 2014, with HQ in San Francisco, CA and facilities in Kassel, Germany • CEO and co-founders with extensive experience building technology companies • Backed by $28M in funding from top-tier investors such as Menlo Ventures, Felicis Ventures, and John Chambers Leaders in Aerial Intrusion Prevention • First-to-market detecting the most advanced WiFi and non-WiFi drones, including DJI Mavic and Phantom 4 • Solution deployed at datacenters, stadiums, correctional facilities, and companies of all sizes

Slide 27

Slide 27 text

Thank You! Bobby Long VP of Sales and Channel bobby@dedrone.com