Overview
Syllabus
Intro
The Mirror Chess Problem
The Three Mirror Chess Problems
Ransomware for Misdirection (and Profit)
Traditional Investment Pyramid
Leaky Abstraction
Adversaries can determine how security teams spend their time
Adversaries get defenders to do their dirty work for them
Migrations
Asymmetry in Rate of Innovation
Weaknesses Inherent to Machine Learning
The Basic Complications
Traditional countermeasures can be ignored
Noise to signal ratio
Behavior Changes, Invalidating Patterns
Policy-driven systems become counterproductive with scale
Machine Learning as Building Block for Next Gen Sec
The Next Generation
What good looks like - E.g. the incident Response Challenge
Strategies for Risk Reduction
How to apply
Established Doctrine of Risks
Taught by
RSA Conference