Marc Goodman
A global strategist, author and consultant focused on the disruptive impact of advancing technologies on security, business and International Affairs.
MEET MARC GOODMAN
Marc Goodman is a global thinker, writer and consultant focused on the disruptive impact of advancing technologies on security, business and international affairs. Over the past twenty years, he has built his expertise in next generation security threats such as cyber crime, cyber terrorism and information warfare working with organizations such as Interpol, the United Nations, NATO, the Los Angeles Police Department and the U.S. Government. Marc frequently advises industry leaders, security executives and global policy makers on transnational cyber risk and intelligence and has operated in nearly seventy countries around the world.
In addition, Marc founded the Future Crimes Institute to inspire and educate others on the security and risk implications of newly emerging technologies. Marc also serves as the Global Security Advisor and Chair for Policy and Law at Silicon Valley’s Singularity University, a NASA and Google sponsored educational venture dedicated to using advanced science and technology to address humanity’s grand challenges. Marc’s current areas of research include the security implications of exponential technologies such as robotics, artificial intelligence, the social data revolution, synthetic biology, virtual worlds, genomics, ubiquitous computing and location-based services.
Since 1999, Marc has worked extensively with INTERPOL, the International Criminal Police Organization, headquartered in Lyon, France where he continues to serve as a Senior Advisor to the organization’s Steering Committee on Information Technology Crime. In that capacity, Marc has trained police forces throughout the Middle East, Africa, Europe, Latin America and Asia and has chaired numerous INTERPOL expert groups on next generation security threats.
In recognition of his professional experience, Marc was asked by the Secretary General of the United Nations International Telecommunications Union (ITU) to join his High Level Experts Group on Global Cybersecurity. He has also worked with other UN entities including the United Nations Institute for Disarmament Research on cyber warfare and has served as a Senior Researcher for the United Nations Counter-Terrorism Task Force on technical measures to counter terrorist use of the Internet.
Marc has authored more than one dozen journal articles and ten book chapters on cybercrime, information security, critical infrastructure protection and cyberterrorism. Representative works have been published by the Harvard Journal of Law & Technology, Oxford University Press, Jane’s Intelligence Review, the American Bar Association, the FBI Law Enforcement Bulletin, the Institute of Electronic and Electronics Engineers (IEEE) and McGraw Hill Publishers.
Marc holds a Master of Public Administration from Harvard University and a Master of Science in the Management of Information Systems from the London School of Economics. In addition, he has served as a Fellow at Stanford University’s Center for International Security and Cooperation. Marc speaks fluent French, Spanish, Italian and German, with limited proficiency in Portuguese, Russian and Japanese.
In addition, Marc founded the Future Crimes Institute to inspire and educate others on the security and risk implications of newly emerging technologies. Marc also serves as the Global Security Advisor and Chair for Policy and Law at Silicon Valley’s Singularity University, a NASA and Google sponsored educational venture dedicated to using advanced science and technology to address humanity’s grand challenges. Marc’s current areas of research include the security implications of exponential technologies such as robotics, artificial intelligence, the social data revolution, synthetic biology, virtual worlds, genomics, ubiquitous computing and location-based services.
Since 1999, Marc has worked extensively with INTERPOL, the International Criminal Police Organization, headquartered in Lyon, France where he continues to serve as a Senior Advisor to the organization’s Steering Committee on Information Technology Crime. In that capacity, Marc has trained police forces throughout the Middle East, Africa, Europe, Latin America and Asia and has chaired numerous INTERPOL expert groups on next generation security threats.
In recognition of his professional experience, Marc was asked by the Secretary General of the United Nations International Telecommunications Union (ITU) to join his High Level Experts Group on Global Cybersecurity. He has also worked with other UN entities including the United Nations Institute for Disarmament Research on cyber warfare and has served as a Senior Researcher for the United Nations Counter-Terrorism Task Force on technical measures to counter terrorist use of the Internet.
Marc has authored more than one dozen journal articles and ten book chapters on cybercrime, information security, critical infrastructure protection and cyberterrorism. Representative works have been published by the Harvard Journal of Law & Technology, Oxford University Press, Jane’s Intelligence Review, the American Bar Association, the FBI Law Enforcement Bulletin, the Institute of Electronic and Electronics Engineers (IEEE) and McGraw Hill Publishers.
Marc holds a Master of Public Administration from Harvard University and a Master of Science in the Management of Information Systems from the London School of Economics. In addition, he has served as a Fellow at Stanford University’s Center for International Security and Cooperation. Marc speaks fluent French, Spanish, Italian and German, with limited proficiency in Portuguese, Russian and Japanese.
Speaking Topics
Lessons in Innovation from the Criminal Underground
The topic of a Harvard Business Review feature article, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.
Criminal groups have become experts in using the breaking news to create opportunities. Moments after a devastating earthquake or the death of a noted celebrity, the digital underground springs into action, releasing new scams and plots to leverage the news to their advantage. Major crime groups have also developed great expertise in outsourcing much of their business to specialists—money launderers, hit men or hackers. Cartels, triads and gangs know that cash is not the only incentive for their workforces and have developed elaborate mechanisms to keep their employees excited and challenged. Moreover, crime groups have become experts in “exploiting the long tail” in their business. Rather than seeking out the million dollar heist, bad guys have learned that it is much easier and sustainable to commit tens of thousands of much smaller digital crimes to keep profits flowing. The illicit transnational networks established for criminal collaboration across borders provides useful lessons for legitimate enterprise in how to thrive and survive in a networked world.
The Need for Cyber Executive ProtectionWhat is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.
Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.
It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.
Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.
The Future of Financial Crime
Financial fraud is on the rise and transnational criminal networks are innovating more quickly than business and government can keep up. The result: fraud on a mass scale across the enterprise in all sectors. In this riveting presentation, Marc Goodman explains how technologies, such as artificial intelligence are being leveraged to create vast networks of fraudulent identities and shell accounts. Discover how new and emerging forms of money, such as virtual encrypted currencies, are being incorporated into the latest criminal modus operandi to circumvent AML and BSA compliance. Hear how algorithmic-based transactions may place firms at risk—especially when the underlying algorithms are poorly understood or easily circumvented by trusted insiders. There is hope, however, including opportunities to proactively leverage emerging forms of open source intelligence (OSINT) to uncover and prevent fraud before it arises. Marc will share the latest intelligence on criminal tradecraft in the world of financial crime, including a thought-provoking analysis of what industry must do to prevent mass disruption to their business models moving forward.
Emerging Security & Privacy Threats in Medicine and Healthcare
Increasingly technology is being integrated into every aspect of medicine and healthcare, with radical—and often poorly understood—implications for both privacy and security. Medical records are being digitized at an astounding rate, but are rarely protected adequately. Moreover, implanted medical devices, ranging from cardiac defibrillators to insulin pumps, have recently been successfully targeted by hackers with potentially deadly results. When these devices fail or are compromised, how will care be effectively rendered? Organized crime groups are committing tens of billions of dollars of healthcare fraud globally, to include holding tens of thousands of patient records ransom, unless blackmail demands are met. Counterfeit medicines pose a threat not just to the intellectual property rights of their developers, but also to an unwitting public at large. Even DNA itself—the world’s original computer operating system—is being hacked through a vibrant network of garage synthetic biologists. While these fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering, they also are opening the door for criminals, fraudsters and even terrorists to target the world of medicine and healthcare in ways never previously thought imaginable. In the fascinating discussion, Marc will present a compelling overview on the latest criminal tradecraft affecting the healthcare industry and will reveal which emerging threats to medicine loom on the horizon. Marc will offer his analysis and thoughts on how to detect, prevent and prepare for these threats before they occur.
The Unwitting Sharing EconomyEveryday, we connect more and more devices to the Internet. It started with desktops, laptops, mobile phones and now tablets. We’ve attached our critical infrastructures, financial systems, and electrical grids to the Net, along with elevators, street lights, fire alarms and pacemakers. Soon, we will be living in increasingly instrumented and interconnected smart cities replete with ubiquitous sensors.
While the positive aspects of the Internet are manifest, its network vulnerabilities have been proven time and time again. Nevertheless, we continue to steamroll ahead, putting all our systems online without much serious regard for either the inherent risks or system complexities. Should we be marching blindly forward without serious consideration of the implications for business and government? How will we respond when it all comes crashing down? How can we prepare for that eventual day? In this captivating presentation, Marc will discuss the unintended consequences that do, and will, arise from our growing dependence on technology as well as provide unconventional insights and preventative measures that can be applied to avoid potential pitfalls.
In Screen We TrustWe are increasingly living in an intermediated world—one in which the majority of our information no longer comes from our direct observations in the “real world,” but rather through a multitude of computer screens. Computers and other electronic gadgets provide us with a constant flow of information. Caller ID tells us who is phoning. The return address of the email lets us know who has written. A check of the store’s inventory system tells how many products are left in stock. Electronic hospital records tell us the patient’s blood type, which arm is to be operated upon, and list known allergic reactions.
The friend request from your co-worker had his picture in the profile, so mustn’t it be legitimate? The voice on our answering machine seems to be from our spouse, but is it? In the information age, we rely on digital technologies to serve as the modern day oracle, providing answers to our never-ending questions. Digital information, however, is infinitely malleable. Caller ID, emails, and even GPS locations are easily spoofed. Exact voice replicas can be synthesized to say anything we want them to, and dead celebrities can be brought back to life to appear in commercials via virtual and holographic technologies.
So, why do we believe anything? How can we tell what is fake and what is not? How might these advances in technology be used against us? This talk will provide the audience with a healthy appreciation for what is possible, what can be spoofed, how to approach digital data with a skeptical eye, and how to survive and thrive in our increasingly intermediated digital world.
The topic of a Harvard Business Review feature article, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.
Criminal groups have become experts in using the breaking news to create opportunities. Moments after a devastating earthquake or the death of a noted celebrity, the digital underground springs into action, releasing new scams and plots to leverage the news to their advantage. Major crime groups have also developed great expertise in outsourcing much of their business to specialists—money launderers, hit men or hackers. Cartels, triads and gangs know that cash is not the only incentive for their workforces and have developed elaborate mechanisms to keep their employees excited and challenged. Moreover, crime groups have become experts in “exploiting the long tail” in their business. Rather than seeking out the million dollar heist, bad guys have learned that it is much easier and sustainable to commit tens of thousands of much smaller digital crimes to keep profits flowing. The illicit transnational networks established for criminal collaboration across borders provides useful lessons for legitimate enterprise in how to thrive and survive in a networked world.
The Need for Cyber Executive ProtectionWhat is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.
Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.
It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.
Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.
The Future of Financial Crime
Financial fraud is on the rise and transnational criminal networks are innovating more quickly than business and government can keep up. The result: fraud on a mass scale across the enterprise in all sectors. In this riveting presentation, Marc Goodman explains how technologies, such as artificial intelligence are being leveraged to create vast networks of fraudulent identities and shell accounts. Discover how new and emerging forms of money, such as virtual encrypted currencies, are being incorporated into the latest criminal modus operandi to circumvent AML and BSA compliance. Hear how algorithmic-based transactions may place firms at risk—especially when the underlying algorithms are poorly understood or easily circumvented by trusted insiders. There is hope, however, including opportunities to proactively leverage emerging forms of open source intelligence (OSINT) to uncover and prevent fraud before it arises. Marc will share the latest intelligence on criminal tradecraft in the world of financial crime, including a thought-provoking analysis of what industry must do to prevent mass disruption to their business models moving forward.
Emerging Security & Privacy Threats in Medicine and Healthcare
Increasingly technology is being integrated into every aspect of medicine and healthcare, with radical—and often poorly understood—implications for both privacy and security. Medical records are being digitized at an astounding rate, but are rarely protected adequately. Moreover, implanted medical devices, ranging from cardiac defibrillators to insulin pumps, have recently been successfully targeted by hackers with potentially deadly results. When these devices fail or are compromised, how will care be effectively rendered? Organized crime groups are committing tens of billions of dollars of healthcare fraud globally, to include holding tens of thousands of patient records ransom, unless blackmail demands are met. Counterfeit medicines pose a threat not just to the intellectual property rights of their developers, but also to an unwitting public at large. Even DNA itself—the world’s original computer operating system—is being hacked through a vibrant network of garage synthetic biologists. While these fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering, they also are opening the door for criminals, fraudsters and even terrorists to target the world of medicine and healthcare in ways never previously thought imaginable. In the fascinating discussion, Marc will present a compelling overview on the latest criminal tradecraft affecting the healthcare industry and will reveal which emerging threats to medicine loom on the horizon. Marc will offer his analysis and thoughts on how to detect, prevent and prepare for these threats before they occur.
The Unwitting Sharing EconomyEveryday, we connect more and more devices to the Internet. It started with desktops, laptops, mobile phones and now tablets. We’ve attached our critical infrastructures, financial systems, and electrical grids to the Net, along with elevators, street lights, fire alarms and pacemakers. Soon, we will be living in increasingly instrumented and interconnected smart cities replete with ubiquitous sensors.
While the positive aspects of the Internet are manifest, its network vulnerabilities have been proven time and time again. Nevertheless, we continue to steamroll ahead, putting all our systems online without much serious regard for either the inherent risks or system complexities. Should we be marching blindly forward without serious consideration of the implications for business and government? How will we respond when it all comes crashing down? How can we prepare for that eventual day? In this captivating presentation, Marc will discuss the unintended consequences that do, and will, arise from our growing dependence on technology as well as provide unconventional insights and preventative measures that can be applied to avoid potential pitfalls.
In Screen We TrustWe are increasingly living in an intermediated world—one in which the majority of our information no longer comes from our direct observations in the “real world,” but rather through a multitude of computer screens. Computers and other electronic gadgets provide us with a constant flow of information. Caller ID tells us who is phoning. The return address of the email lets us know who has written. A check of the store’s inventory system tells how many products are left in stock. Electronic hospital records tell us the patient’s blood type, which arm is to be operated upon, and list known allergic reactions.
The friend request from your co-worker had his picture in the profile, so mustn’t it be legitimate? The voice on our answering machine seems to be from our spouse, but is it? In the information age, we rely on digital technologies to serve as the modern day oracle, providing answers to our never-ending questions. Digital information, however, is infinitely malleable. Caller ID, emails, and even GPS locations are easily spoofed. Exact voice replicas can be synthesized to say anything we want them to, and dead celebrities can be brought back to life to appear in commercials via virtual and holographic technologies.
So, why do we believe anything? How can we tell what is fake and what is not? How might these advances in technology be used against us? This talk will provide the audience with a healthy appreciation for what is possible, what can be spoofed, how to approach digital data with a skeptical eye, and how to survive and thrive in our increasingly intermediated digital world.
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.