Explore aviation-inspired strategies for maturing information security practices in this conference talk. Delve into lessons from the aviation industry on effective information sharing and their application to cybersecurity. Learn about the evolution of safety protocols, including the birth of checklists and crash report analysis. Discover how these concepts can be adapted to improve incident response, breach management, and overall security posture in the digital realm. Gain insights on establishing boundaries, implementing board certifications, and fostering a culture of continuous improvement within information security teams. Draw parallels between classic aviation challenges and modern cybersecurity issues, using examples like the B-17 Bomber and the Millennium Falcon to illustrate key points. Understand the importance of feedback loops and table-top exercises in enhancing organizational readiness for security incidents.
Overview
Syllabus
Intro
Living with Experience
Agenda
Computers are hard
Board Certification
Boundaries
Breaches
Han Solo
Millennium Falcon
Classic Information Sharing
B17 Bomber
Birth of the Checklist
Information Sharing
The Strings Bells
Feedback from Dan
Reading Crash Reports
Table Top Gun