YoVDO

Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Public Policy Courses Cloud Security Courses

Course Description

Overview

Explore a comprehensive analysis of cybersecurity strategies in this Black Hat conference talk. Delve into the findings of a recent task force that identified key technologies, operational innovations, and public policies crucial for achieving security at scale. Discover how these innovations provide a greater defensive advantage per dollar spent compared to offensive measures. Learn about the top 10 technologies and next game-changing advancements in cybersecurity. Examine process innovations and policy default decisions that can reshape the cybersecurity landscape. Gain insights into the concept of a Cyber Independent Testing Lab and its potential impact. Analyze the current state of global cybersecurity efforts and their effectiveness. Address critical questions about attacker speed, technical solutions, cloud security, and the impact of government control on cyber defense strategies.

Syllabus

Introduction
Policy Talk
Defense Asymmetry
Central Strategy
Defense vs Offense
For 35 Years
Asymmetry of Offense
The Attacker Advantage
Saving the Internet
New York Cyber Task Force
The Idea
Externalities
Climate Change
Most Scale Least Cost
The Worst Policy
Top 10 Technologies
Next Game Changing Technologies
What So
Process Innovation
Policy Default Decisions
No Defense First
Cyber Independent Testing Lab
Conclusion
Global GDP
How are we doing
Last Slide
Questions
Are attackers getting faster
Technical solutions
Cloud security
No decline in China attacks
Impact of government control


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube