Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a panel discussion on the Wassenaar Arrangement's export control of "intrusion software" and its impact on the cybersecurity industry. Delve into the history of these controls, their implementation across participating countries, and the potential consequences for legitimate security work. Gain insights from experts in security research, bug bounty programs, and privacy as they discuss the implications of these regulations. Examine the parallels with the crypto wars of the 1990s and consider how these rules might affect the balance between defenders and attackers in the cybersecurity landscape. Learn about the challenges faced by the United States Government in implementing these rules and the concerns raised by the security community. Analyze the definition of "intrusion software," the role of the Commerce Department, and the potential effects on bug bounty programs and high-threat engagements. Reflect on the need for export controls and their potential to create a prohibition-era-like environment in the cybersecurity field.
Syllabus
Introduction
History of the controls
The Commerce Department
Was there a kickback in Europe
What is intrusion software
Bug bounty programs
Whats the big deal
Lack of threat modeling
Highthreat engagements
Export restrictions on software
Similarities to the 90s
A prohibitionera
The need for export controls
Questions
Comments
Taught by
Black Hat