2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
Upcoming SlideShare
Loading in...5
×
 

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

on

  • 2,919 views

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including ...

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

Statistics

Views

Total Views
2,919
Views on SlideShare
2,916
Embed Views
3

Actions

Likes
1
Downloads
34
Comments
0

1 Embed 3

http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS Presentation Transcript

  • Black Hat Black Hat Rod Beckstrom Director
  • WIRED Black Hat Rod Beckstrom Director
  • The Prisoners Dilemma
  •  
  • Insider threats and hackers…
  •  
  • Who reengineered the system?
  •  
  • A great challenge today Let’s work together to Create something new
  • Where do we want to go with this system? What is the end state we seek?
  • Slight problem… We don’t know the rules
  •  
  • Physics of networking? Economics of networks? Economics of security? Risk management?
  • Economics of Security
  • where C = total cost S = cost of security L = expected cost of loss Economics of Security MINIMIZE C = S + L
  • Loss $ Security $ Economics of Security
  • Loss $ Security $ Economics of Security
  • IPV6, BGP, DNS, SMS/IP, POTS … Economics of Protocols
  • Loss $ Security $ Economics of Protocols Better Protocols Drive Loss Function Down
  • Privacy/Security/Convenience Economics of Privacy
  • Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
  • The Prisoners Dilemma
  • The Prisoners Dilemma W/W W/L L/W W/W L/L
  • The Prisoners Dilemma W/W W/L L/W W/W L/L
  • The Prisoners Dilemma W/W W/L L/W W/W L/L
  • Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  • E Pluribus Unum
  • Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
  • Where do we wish to plant our flag in cyberspace?