SlideShare a Scribd company logo
1 of 39
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma

More Related Content

More from Adrian Sanabria

Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
From due diligence to IoT disaster
From due diligence to IoT disasterFrom due diligence to IoT disaster
From due diligence to IoT disasterAdrian Sanabria
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?Adrian Sanabria
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps OverviewAdrian Sanabria
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsAdrian Sanabria
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresAdrian Sanabria
 
Why does InfoSec play bass?
Why does InfoSec play bass?Why does InfoSec play bass?
Why does InfoSec play bass?Adrian Sanabria
 

More from Adrian Sanabria (16)

Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
From due diligence to IoT disaster
From due diligence to IoT disasterFrom due diligence to IoT disaster
From due diligence to IoT disaster
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
 
Why does InfoSec play bass?
Why does InfoSec play bass?Why does InfoSec play bass?
Why does InfoSec play bass?
 

Recently uploaded

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computationsit20ad004
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 

Recently uploaded (20)

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computation
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
 

Editor's Notes

  1. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  2. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  3. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  4. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  5. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  6. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  7. A bit of a tease here - see if you can spot the pattern
  8. Vendors, industry analysts, investors, even defenders... are eager to see their suspicions confirmed... and to get validation for what they do. InfoSec is FULL of mission-oriented folks that don't just do this for the money, this is also a calling for them. They have a deep desire to hear that what they do makes a difference; makes the world a safer place. Vendors and investors desire market fit; validation that they're building the right product at the right time to get that evasive 100x return Lies and myths are welcomed with open arms
  9. Sunk cost fallacy is also an issue here how do you think someone feels when they find out they've been spreading a myth in every sales conversation for the past 2 years? Some recover and stop Others just continue THIS is where a myth becomes a lie People often wonder if scenarios like Theranos were always a scam, or if there was a turning point. I believe most start out with good intentions My theory is that the turning point is often a sunk cost decision
  10. Cybercrime will cause $10.5 trillion in damages in 2023? 146 billion records will be stolen? Over the last two decades, nearly every credit card in the world was exposed in a data breach and what was the impact? It was impossible for carders to monetize even a tiny fraction of the data stolen It wasn't scalable 146 records stolen 45 million credit cards exposed $2.9 billion dollars per minute? WHY NOT 100 million port scans blocked at the firewall it's all meaningless
  11. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  12. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  13. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  14. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  15. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  16. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  17. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  18. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  19. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  20. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  21. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  22. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  23. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  24. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  25. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  26. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  27. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  28. I learned many things from Wendy Nather, but one of the most important and useful lessons was to slow down, check my claims and statements, and make sure everything I'm saying was DEFENSIBLE.When we worked as analysts, everyone loved writing up a hot take on a topic, but it needed to be examined from multiple perspectives. It needed to be clearly stated as opinion or fact. It needed receipts, attributions, and references to back it up in case there's anger, blowback, or whatever else. Wendy would always back me up, as long as I wasn't talking out my ass and gave her something DEFENSIBLE to defend.This is all I'm asking here, and the main thing I want you to take away from this talk. Posting to twitter, writing a blog, working with marketing - take a little bit of extra time to make sure what you're sharing is true and defensible.And if you're feeling really spicy, help me out in challenging all the indefensible myths and lies out there.
  29. This is my conclusion cassowary He wants you to factor in some extra time for fact checks