Black Hat Black Hat Rod Beckstrom Director
The Prisoners Dilemma
 
Insider threats  and hackers…
 
Who reengineered  the system?
 
A great challenge today Let’s work together to Create something new
Where do we want to go with this system? What is the  end state we seek?
Slight problem… We don’t know the rules
 
Physics of networking? Economics of networks? Economics of security? Risk management?
Economics of Security
where  C = total cost   S = cost of security   L = expected cost of loss Economics of Security MINIMIZE  C =  S + L
Loss $ Security $ Economics of Security
Loss $ Security $ Economics of Security
IPV6, BGP, DNS, SMS/IP,  POTS … Economics of Protocols
Loss $ Security $ Economics of Protocols Better Protocols Drive  Loss Function Down
Privacy/Security/Convenience Economics of Privacy
Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
The Prisoners Dilemma
The Prisoners Dilemma W/W W/L L/W W/W L/L
The Prisoners Dilemma W/W W/L L/W W/W L/L
The Prisoners Dilemma W/W W/L L/W W/W L/L
Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
E Pluribus Unum
Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
Where do we wish to plant our flag in cyberspace?
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
Upcoming SlideShare
Loading in...5
×

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

1,696

Published on

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,696
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
36
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

    1. 1. Black Hat Black Hat Rod Beckstrom Director
    2. 2. WIRED Black Hat Rod Beckstrom Director
    3. 3. The Prisoners Dilemma
    4. 5. Insider threats and hackers…
    5. 7. Who reengineered the system?
    6. 9. A great challenge today Let’s work together to Create something new
    7. 10. Where do we want to go with this system? What is the end state we seek?
    8. 11. Slight problem… We don’t know the rules
    9. 13. Physics of networking? Economics of networks? Economics of security? Risk management?
    10. 14. Economics of Security
    11. 15. where C = total cost S = cost of security L = expected cost of loss Economics of Security MINIMIZE C = S + L
    12. 16. Loss $ Security $ Economics of Security
    13. 17. Loss $ Security $ Economics of Security
    14. 18. IPV6, BGP, DNS, SMS/IP, POTS … Economics of Protocols
    15. 19. Loss $ Security $ Economics of Protocols Better Protocols Drive Loss Function Down
    16. 20. Privacy/Security/Convenience Economics of Privacy
    17. 21. Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
    18. 22. The Prisoners Dilemma
    19. 23. The Prisoners Dilemma W/W W/L L/W W/W L/L
    20. 24. The Prisoners Dilemma W/W W/L L/W W/W L/L
    21. 25. The Prisoners Dilemma W/W W/L L/W W/W L/L
    22. 26. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
    23. 27. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
    24. 28. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
    25. 29. E Pluribus Unum
    26. 30. Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
    27. 31. Where do we wish to plant our flag in cyberspace?

    ×