YoVDO

Our Kryptonite - A Defendable Internet

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Complexity Courses Harm Reduction Courses Online Safety Courses

Course Description

Overview

Explore the evolution of internet security and the challenges in creating a defendable online environment in this thought-provoking keynote address from Black Hat. Delve into the economic incentives and structures that shape IT security, examining how they impact the overall security landscape. Analyze the progress made in the five years since Thomas Dullien's influential presentation on the same topic. Investigate whether efforts to build a more secure internet have been successful or if there's a growing trend towards data localization and fragmentation. Consider the implications of a two-tiered security system where advanced protection is available only to those who can afford it. Examine the tension between open, transparent internet architecture and the need for robust security measures. Gain insights into the history of internet security and explore potential strategies for creating a truly defendable internet accessible to all users. Learn about key concepts such as complexity management, harm reduction, and the role of the security community in shaping the future of online safety.

Syllabus

Introduction
Complexity vs Time
Control Over Time
How Many People Monitor
Better Engagement
Reducing Harm
Options
Think About Time
Introducing Daniel Cuthbert
We are in a cool industry
Jeremy Fleming
The Offensive World
We Cant Build A Secure Internet
The Ninja Reaction
How do we fix it
The potential of our industry
The problem
Oday
Scorecard
Integrity
BGP
GDPR
The Community
A Defendable Internet


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube