2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

on

  • 2,957 views

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including ...

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

Statistics

Views

Total Views
2,957
Views on SlideShare
2,954
Embed Views
3

Actions

Likes
1
Downloads
34
Comments
0

1 Embed 3

http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS Presentation Transcript

  • 1. Black Hat Black Hat Rod Beckstrom Director
  • 2. WIRED Black Hat Rod Beckstrom Director
  • 3. The Prisoners Dilemma
  • 4.  
  • 5. Insider threats and hackers…
  • 6.  
  • 7. Who reengineered the system?
  • 8.  
  • 9. A great challenge today Let’s work together to Create something new
  • 10. Where do we want to go with this system? What is the end state we seek?
  • 11. Slight problem… We don’t know the rules
  • 12.  
  • 13. Physics of networking? Economics of networks? Economics of security? Risk management?
  • 14. Economics of Security
  • 15. where C = total cost S = cost of security L = expected cost of loss Economics of Security MINIMIZE C = S + L
  • 16. Loss $ Security $ Economics of Security
  • 17. Loss $ Security $ Economics of Security
  • 18. IPV6, BGP, DNS, SMS/IP, POTS … Economics of Protocols
  • 19. Loss $ Security $ Economics of Protocols Better Protocols Drive Loss Function Down
  • 20. Privacy/Security/Convenience Economics of Privacy
  • 21. Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
  • 22. The Prisoners Dilemma
  • 23. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 24. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 25. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 26. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 27. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 28. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 29. E Pluribus Unum
  • 30. Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
  • 31. Where do we wish to plant our flag in cyberspace?