Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of cybersecurity strategies in this 52-minute Black Hat conference talk. Delve into the findings of a recent task force that identified key technologies, operational innovations, and public policies crucial for achieving defensible cyberspace at scale. Examine the concept of defense asymmetry and learn why a dollar spent on defense can yield greater returns than offense. Discover the top 10 technologies that have proven most effective in cybersecurity and understand the characteristics that make them special. Investigate process innovations and policy default decisions that can shift the balance in favor of defenders. Consider the parallels between cybersecurity challenges and climate change, exploring the concept of externalities. Gain insights into the current state of cyber defense, including discussions on cloud security, China's cyber activities, and the impact of government control. Engage with thought-provoking questions about the evolving speed of attackers and potential technical solutions for a more secure digital future.
Syllabus
Introduction
Policy
Defense Asymmetry
Central Strategy
Defense vs Offense
Spending on Attack
The Attacker Advantage
What We Need to Do
New York Cyber Task Force
Defensible
Externalities
Climate Change
Most Scale Least Cost
What Was the Worst
Top 10 Technologies
What can we learn from these technologies
What makes these technologies special
Process innovation
Policy default decisions
No Defense First
Closing
Cyber Shangrila
How are we doing
Questions
Are attackers getting faster
Technical solutions
Cloud
China Attacks
Impact of Government Control
Taught by
Black Hat