SlideShare a Scribd company logo
War, Accidents, or Disease?
Keynote
Chris Wysopal
January 16, 2016
2
The current government paradigm
• Threat information
• Attack signatures and
Attack sources
• Collected by Govt. and
Industry
• Shared in secret
• BONUS: Maybe with
your personal data too.
3
Why didn’t we follow these models?
4
Incident Disclosure
NTSB Incident Reports
• Designed to learn from incidents and Improve
• Root cause analysis
• Recommendations
• Public Investigation for serious incidents
• Follows sound engineering principle of
learning from failures.
9
Outcome is Safety Recommendations and Safety Alerts
“Recommendations are sent to the organization best able to
address the safety issue, whether it is public or private.”
Is the InfoSec paradigm closest to safety?
Alex Stamos comments, “A secure system is safe
if it is operated correctly. A safe system is safe if
it is operated.”
I’ll add the unspoken, “even in the presence of
an attacker.”
If we use war as a
paradigm we will
learn from and
operate like the
military.
Secrecy keeps
markets from
functioning
Transparency
can unlock
market
dysfunction.
FTC wins case against Wyndham
Hotels
Cybersecurity Disclosure Act of 2015
Questions
23
Chris Wysopal
cwysopal@veracode.com
@weldpond

More Related Content

Viewers also liked

1.sifat fisika+kimia obat
1.sifat fisika+kimia obat1.sifat fisika+kimia obat
1.sifat fisika+kimia obat
Cweh Imitasi
 
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
Takanobu Mizuta
 
Geo Python16 keynote
Geo Python16 keynoteGeo Python16 keynote
Geo Python16 keynote
Romeo Kienzler
 
Engaging Leadership Hot Tips Collection
Engaging Leadership Hot Tips CollectionEngaging Leadership Hot Tips Collection
Engaging Leadership Hot Tips Collection
Engage for Success
 
Elaine MacIntyre - Behind 'Explore'
Elaine MacIntyre - Behind 'Explore'Elaine MacIntyre - Behind 'Explore'
Elaine MacIntyre - Behind 'Explore'
Museums Computer Group
 
Telecom marge verhogen? Hoe het anders kan…
Telecom marge verhogen? Hoe het anders kan…Telecom marge verhogen? Hoe het anders kan…
Telecom marge verhogen? Hoe het anders kan…
Mark Koot
 
I wonder ... Designing for Curiosity
I wonder ... Designing for CuriosityI wonder ... Designing for Curiosity
I wonder ... Designing for Curiosity
Sebastian Deterding
 
Companies financial result updated on 18 oct 2016
Companies financial result updated on 18 oct 2016Companies financial result updated on 18 oct 2016
Companies financial result updated on 18 oct 2016
RAFI SECURITIES (PVT.)LTD.
 
Plone.restapi - a bridge to the modern web
Plone.restapi - a bridge to the modern webPlone.restapi - a bridge to the modern web
Plone.restapi - a bridge to the modern web
Timo Stollenwerk
 
How to Get the Most Out of Your NPS Project
How to Get the Most Out of Your NPS ProjectHow to Get the Most Out of Your NPS Project
How to Get the Most Out of Your NPS Project
Totango
 
Un plan de marketing no es un plan de comunicación
Un plan de marketing no es un plan de comunicaciónUn plan de marketing no es un plan de comunicación
Un plan de marketing no es un plan de comunicación
Nieves Gonzalez
 
Exploring the replication in MongoDB
Exploring the replication in MongoDBExploring the replication in MongoDB
Exploring the replication in MongoDB
Igor Donchovski
 
Els reptes dels hospitals del futur
Els reptes dels hospitals del futurEls reptes dels hospitals del futur
Els reptes dels hospitals del futur
Jordi Varela
 

Viewers also liked (14)

1.sifat fisika+kimia obat
1.sifat fisika+kimia obat1.sifat fisika+kimia obat
1.sifat fisika+kimia obat
 
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
東京大学工学部 金融市場の数理と情報 第5回(2016/10/26) 人工市場を用いた金融市場の制度・規制の設計 スパークス・アセット・マネジメント株式会...
 
Geo Python16 keynote
Geo Python16 keynoteGeo Python16 keynote
Geo Python16 keynote
 
Engaging Leadership Hot Tips Collection
Engaging Leadership Hot Tips CollectionEngaging Leadership Hot Tips Collection
Engaging Leadership Hot Tips Collection
 
Elaine MacIntyre - Behind 'Explore'
Elaine MacIntyre - Behind 'Explore'Elaine MacIntyre - Behind 'Explore'
Elaine MacIntyre - Behind 'Explore'
 
Telecom marge verhogen? Hoe het anders kan…
Telecom marge verhogen? Hoe het anders kan…Telecom marge verhogen? Hoe het anders kan…
Telecom marge verhogen? Hoe het anders kan…
 
I wonder ... Designing for Curiosity
I wonder ... Designing for CuriosityI wonder ... Designing for Curiosity
I wonder ... Designing for Curiosity
 
Companies financial result updated on 18 oct 2016
Companies financial result updated on 18 oct 2016Companies financial result updated on 18 oct 2016
Companies financial result updated on 18 oct 2016
 
Plone.restapi - a bridge to the modern web
Plone.restapi - a bridge to the modern webPlone.restapi - a bridge to the modern web
Plone.restapi - a bridge to the modern web
 
How to Get the Most Out of Your NPS Project
How to Get the Most Out of Your NPS ProjectHow to Get the Most Out of Your NPS Project
How to Get the Most Out of Your NPS Project
 
Un plan de marketing no es un plan de comunicación
Un plan de marketing no es un plan de comunicaciónUn plan de marketing no es un plan de comunicación
Un plan de marketing no es un plan de comunicación
 
Exploring the replication in MongoDB
Exploring the replication in MongoDBExploring the replication in MongoDB
Exploring the replication in MongoDB
 
Els reptes dels hospitals del futur
Els reptes dels hospitals del futurEls reptes dels hospitals del futur
Els reptes dels hospitals del futur
 
cáncer de mama
cáncer de mamacáncer de mama
cáncer de mama
 

Similar to BSides NYC Wysopal Keynote

The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
Matthew J McMahon
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
Micheal Axelsen
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
Angilina Jones
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Security economics
Security economicsSecurity economics
Security economics
Yansi Keim
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
Kurt Hagerman
 
Big Data and Next Generation Mental Health
Big Data and Next Generation Mental HealthBig Data and Next Generation Mental Health
Big Data and Next Generation Mental Health
Cloudera, Inc.
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
Varun Mithran
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
Dendreon
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
FireEye, Inc.
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
Evolver Inc.
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk ReportAngela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016Tim Grieveson
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 

Similar to BSides NYC Wysopal Keynote (20)

The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Security economics
Security economicsSecurity economics
Security economics
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
 
Big Data and Next Generation Mental Health
Big Data and Next Generation Mental HealthBig Data and Next Generation Mental Health
Big Data and Next Generation Mental Health
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

BSides NYC Wysopal Keynote

Editor's Notes

  1. Do we want a military and intelligence community vision of information sharing? Or do we treat information risk as a health and safety issue
  2. CDC - Mandatory Reporting of Infectious Diseases by Clinicians Under the OSHA Recordkeeping regulation (29 CFR 1904), covered employers are required to prepare and maintain records of serious occupational injuries and illnesses, using the OSHA 300 Log. This information is important for employers, workers and OSHA in evaluating the safety of a workplace, understanding industry hazards, and implementing worker protections to reduce and eliminate hazards. Dangerous Products (Section 15) - Manufacturers, importers, distributors, and retailers are required to report to CPSC under Section 15 (b) of the Consumer Product Safety Act (CPSA) within 24 hours of obtaining information which reasonably supports the conclusion that a product does not comply with a safety rule issued under the CPSA, or contains a defect which could create a substantial risk of injury to the public or presents an unreasonable risk of serious injury or death, 15 U.S.C. § 2064(b). Companies can use our on-line form to report a potentially defective or hazardous product. NTSB Federal regulations require operators to notify the NTSB immediately of aviation accidents and certain incidents. An accident is defined as an occurrence associated with the operation of an aircraft that takes place between the time any person boards the aircraft with the intention of flight and all such persons have disembarked, and in which any person suffers death or serious injury, or in which the aircraft receives substantial damage. An incident is an occurrence other than an accident that affects or could affect the safety of operations. (See 49 CFR 830.)
  3. First commercial air traffic in the 1920’s. NTSB created in 1938. About 20 years after commercial air transport begins formal incident investigation begins. We are more about 23 years into the internet era and incident investigation is fragmented.
  4. Safety Recommendations Safety recommendations are issued by the NTSB following the investigation of transportation accidents and the completion of safety studies. Recommendations usually address a specific issue uncovered during an investigation or study and specify how to correct the situation. Letters containing the recommendations are sent to the organization best able to address the safety issue, whether it is public or private. Learn More > Safety Alerts Take action to improve your safety and the safety of your family and friends by following the suggestions in these NTSB Safety Alerts. NTSB Safety Alerts provide safety information you can use, and urge you to encourage lawmakers to improve safety at the State level.
  5. Is getting Conficker in 2016 an attack or an accident or is it like catching a disease?
  6. Aren’t most security incidents closer to getting Cholera than getting attacked. They are incidents of opportunity. Dan Geer says to look at systems as an ecosystem where organisms survive in an available niche. A vulnerable system is a niche
  7. Aren’t most security incidents closer to getting Cholera than getting attacked. They are incidents of opportunity. Dan Geer says to look at systems as an ecosystem where organisms survive in an available niche. A vulnerable system is a niche. The organism might consume your resources, algae in a pond, locusts eating your crops, cholera might kill you. These organisms are looking out for them selves but they might harm you.
  8. An unsafe system when used as it is intended will have bad consequences. Creating heat around a flammable object might cause a fire if it isn’t done safely. Exchanging data on the internet might lead to a compromised system if not done safely.
  9. Surveillance state. Centralized governmental power over information security.
  10. Public companies would need to disclose cybersecurity expertise at board level in SEC docs If they can’t they have to disclose how cyber risk is governed and why what they are doing is OK. These help transparancy and can unlock market forces of liability and insurance.
  11. Why are consumer of software asking this question? We are starting to see it in enterprises, Financial Service.