Magical Thinking and How to Thwart It
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the concept of magical thinking in cybersecurity through this 28-minute conference talk from BSidesLV 2017. Delve into various examples of magical thinking, including "going dark," crypto jihad, information sharing, and submarines. Examine the impact of magical thinking on operations, maintenance, and intrusion software. Learn about structural fixes and the new General ISM. Understand why current approaches are failing and discover the importance of research and translation layers in addressing these challenges. Gain insights from Mara Tam's policy-focused rant and participate in a Q&A session to further discuss the topic.
Syllabus
Introduction
Literature Review
Policy Talk Rant
Examples of Magical Thinking
Going Dark
Crypto Jihad
Information Sharing
Submarines
Operations and Maintenance
Wang
Intrusion software
Structural fixes
New General ISM
We are Failing
Research
Translation Layers
Questions
Taught by
BSidesLV
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network