Playing to Win – Designing Protection Based on Mob Rules
Conventional wisdom dictates it should be possible to have virtual security in cyberspace. However, with its competing authorities, responsibilities, and domains, it is untenable to fully secure cyberspace. Even if it were technically possible, would we have what it takes to secure the Internet? The level of commitment required, the appetite for risk and the willingness to “do what it takes” to get the job done is not present within the cyber security community of interest.
So what would it take to effectively secure the Internet or at least the portion of the network relevant to you? Thinking outside of the norm, what would happen if the Corleone or Soprano Family governed the Internet? Could the fictional scenario of a made for movie mafia families do what can’t be done with current technology and policy?
We will explore how the Mafia family dynamic can be applied to securing each segment of their cyber ecosystem. Their methods, while brutal and sometimes unprovoked, are effective. If you are going to play, play to win!
RecordedFeb 27 201260 mins
Your place is confirmed, we'll send you email reminders
Jack Daniel, Technical Product Manager at Tenable Network Security
"It's a great situation when you have a hobby which becomes a job. And for a lot of hackers, we're doing something for fun, and somebody's going to pay us to do it." Jack Daniel, Technical Product Manager at Tenable and a well-known industry figure, comments on the transformations that many hackers encounter as they enter the world of productivity and management.
Josh Corman, Director of Security Intelligence, Akamai Technologies
"Security issues are permeating every aspect of our personal lives, it's not just our day jobs anymore." Josh Corman, Director of Security Intelligence at Akamai, talks about his research of Anonymous and the social impact of the measures taken to fight "scary hackers."
Tom Kellermann, VP of Cyber Security at Trend Micro
"Virus scanners, firewalls and encryption aren't sufficient to deal with today's threat."
Tom Kellermann, VP of Cyber Security at Trend Micro discusses the future of endpoint security in a world where everyone is walking around with bugs in their pocket.
Andrew Hay, CloudPassage, Michael Schell, Wavestrong; Stuart McClure, Cylance; Matt Johansen, WhiteHat Security
Join thought leaders from the top organizations who presented at BSides LA event as they summarize their presentations and discuss upcoming challenges for security professionals in 2012/13.
Panel:
Daniel Blander, Organizer, BSides LA (moderator)
Andrew Hay, Chief Evangelist, CloudPassage
Michael Schell, Regional Sales Manager, Wavestrong
Stuart McClure, CEO, Cylance
Matt Johansen, Manager - Threat Research Center, WhiteHat Security
Playing to Win – Designing Protection Based on Mob RulesMatt Stern and Derek Gabbard[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins