2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

  • 2,979 views
Uploaded on

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including......

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,979
On Slideshare
2,976
From Embeds
3
Number of Embeds
1

Actions

Shares
Downloads
35
Comments
0
Likes
1

Embeds 3

http://www.slideshare.net 3

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Black Hat Black Hat Rod Beckstrom Director
  • 2. WIRED Black Hat Rod Beckstrom Director
  • 3. The Prisoners Dilemma
  • 4.  
  • 5. Insider threats and hackers…
  • 6.  
  • 7. Who reengineered the system?
  • 8.  
  • 9. A great challenge today Let’s work together to Create something new
  • 10. Where do we want to go with this system? What is the end state we seek?
  • 11. Slight problem… We don’t know the rules
  • 12.  
  • 13. Physics of networking? Economics of networks? Economics of security? Risk management?
  • 14. Economics of Security
  • 15. where C = total cost S = cost of security L = expected cost of loss Economics of Security MINIMIZE C = S + L
  • 16. Loss $ Security $ Economics of Security
  • 17. Loss $ Security $ Economics of Security
  • 18. IPV6, BGP, DNS, SMS/IP, POTS … Economics of Protocols
  • 19. Loss $ Security $ Economics of Protocols Better Protocols Drive Loss Function Down
  • 20. Privacy/Security/Convenience Economics of Privacy
  • 21. Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
  • 22. The Prisoners Dilemma
  • 23. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 24. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 25. The Prisoners Dilemma W/W W/L L/W W/W L/L
  • 26. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 27. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 28. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • 29. E Pluribus Unum
  • 30. Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
  • 31. Where do we wish to plant our flag in cyberspace?