2008 black hat cybersecurity keynote- rod beckstrom, director ncsc, dhs
DESCRIPTION
Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.TRANSCRIPT
Black Hat
Rod BeckstromDirector
Black Hat
Black Hat
Rod BeckstromDirector
WIRED
Presenter’s Name June 17, 2003
The Prisoners Dilemma
Presenter’s Name June 17, 2003
Presenter’s Name June 17, 2003
Insider threats and hackers…
Presenter’s Name June 17, 2003
Presenter’s Name June 17, 2003
Who reengineered the system?
Presenter’s Name June 17, 2003
Presenter’s Name June 17, 2003
A great challenge today
Let’s work together toCreate something new
Presenter’s Name June 17, 2003
Where do we want to go with this system?
What is the end state we seek?
Presenter’s Name June 17, 2003
Slight problem…
We don’t know the rules
Presenter’s Name June 17, 2003
Presenter’s Name June 17, 2003
Physics of networking?Economics of networks?Economics of security?
Risk management?
Presenter’s Name June 17, 2003
Economics of Security
Presenter’s Name June 17, 2003
where C = total cost S = cost of security L = expected cost of loss
Economics of Security
MINIMIZE C = S + L
Presenter’s Name June 17, 2003
Loss $
Security $
Economics of Security
Presenter’s Name June 17, 2003
Loss $
Security $
Economics of Security
Presenter’s Name June 17, 2003
IPV6, BGP, DNS, SMS/IP, POTS …
Economics of Protocols
Presenter’s Name June 17, 2003
Loss $
Security $
Economics of Protocols
Better Protocols Drive Loss Function Down
Presenter’s Name June 17, 2003
Privacy/Security/Convenience
Economics of Privacy
Presenter’s Name June 17, 2003
Cyber democracyCyber governanceCyber quarantines
Cyber justiceCyber diplomacy
New Cyber Frontiers
Presenter’s Name June 17, 2003
The Prisoners Dilemma
Presenter’s Name June 17, 2003
The Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
Presenter’s Name June 17, 2003
The Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
Presenter’s Name June 17, 2003
The Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
Presenter’s Name June 17, 2003
Iterated Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
200 X
Presenter’s Name June 17, 2003
Iterated Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
200 X
Presenter’s Name June 17, 2003
Iterated Prisoners Dilemma
W/W
W/L
L/WW/W
L/L
200 X
Presenter’s Name June 17, 2003
E Pluribus Unum
Presenter’s Name June 17, 2003
Constitutional codeNew cyber rulesNew economicsNew protocols
Develop cyber diplomacy…Global collaboration…
Summary
Presenter’s Name June 17, 2003
Where do we wish to plant our flag in cyberspace?