2008 black hat cybersecurity keynote- rod beckstrom, director ncsc, dhs

Post on 26-Jun-2015

1.667 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

TRANSCRIPT

Black Hat

Rod BeckstromDirector

Black Hat

Black Hat

Rod BeckstromDirector

WIRED

Presenter’s Name June 17, 2003

The Prisoners Dilemma

Presenter’s Name June 17, 2003

Presenter’s Name June 17, 2003

Insider threats and hackers…

Presenter’s Name June 17, 2003

Presenter’s Name June 17, 2003

Who reengineered the system?

Presenter’s Name June 17, 2003

Presenter’s Name June 17, 2003

A great challenge today

Let’s work together toCreate something new

Presenter’s Name June 17, 2003

Where do we want to go with this system?

What is the end state we seek?

Presenter’s Name June 17, 2003

Slight problem…

We don’t know the rules

Presenter’s Name June 17, 2003

Presenter’s Name June 17, 2003

Physics of networking?Economics of networks?Economics of security?

Risk management?

Presenter’s Name June 17, 2003

Economics of Security

Presenter’s Name June 17, 2003

where C = total cost S = cost of security L = expected cost of loss

Economics of Security

MINIMIZE C = S + L

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Security

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Security

Presenter’s Name June 17, 2003

IPV6, BGP, DNS, SMS/IP, POTS …

Economics of Protocols

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Protocols

Better Protocols Drive Loss Function Down

Presenter’s Name June 17, 2003

Privacy/Security/Convenience

Economics of Privacy

Presenter’s Name June 17, 2003

Cyber democracyCyber governanceCyber quarantines

Cyber justiceCyber diplomacy

New Cyber Frontiers

Presenter’s Name June 17, 2003

The Prisoners Dilemma

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Presenter’s Name June 17, 2003

E Pluribus Unum

Presenter’s Name June 17, 2003

Constitutional codeNew cyber rulesNew economicsNew protocols

Develop cyber diplomacy…Global collaboration…

Summary

Presenter’s Name June 17, 2003

Where do we wish to plant our flag in cyberspace?

top related