2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

31
Black Hat Rod Beckstrom Director Black Hat

description

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

Transcript of 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Page 1: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Black Hat

Rod BeckstromDirector

Black Hat

Page 2: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Black Hat

Rod BeckstromDirector

WIRED

Page 3: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

The Prisoners Dilemma

Page 4: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Page 5: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Insider threats and hackers…

Page 6: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Page 7: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Who reengineered the system?

Page 8: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Page 9: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

A great challenge today

Let’s work together toCreate something new

Page 10: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Where do we want to go with this system?

What is the end state we seek?

Page 11: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Slight problem…

We don’t know the rules

Page 12: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Page 13: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Physics of networking?Economics of networks?Economics of security?

Risk management?

Page 14: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Economics of Security

Page 15: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

where C = total cost S = cost of security L = expected cost of loss

Economics of Security

MINIMIZE C = S + L

Page 16: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Security

Page 17: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Security

Page 18: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

IPV6, BGP, DNS, SMS/IP, POTS …

Economics of Protocols

Page 19: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Loss $

Security $

Economics of Protocols

Better Protocols Drive Loss Function Down

Page 20: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Privacy/Security/Convenience

Economics of Privacy

Page 21: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Cyber democracyCyber governanceCyber quarantines

Cyber justiceCyber diplomacy

New Cyber Frontiers

Page 22: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

The Prisoners Dilemma

Page 23: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Page 24: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Page 25: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

The Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

Page 26: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Page 27: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Page 28: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Iterated Prisoners Dilemma

W/W

W/L

L/WW/W

L/L

200 X

Page 29: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

E Pluribus Unum

Page 30: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Constitutional codeNew cyber rulesNew economicsNew protocols

Develop cyber diplomacy…Global collaboration…

Summary

Page 31: 2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

Presenter’s Name June 17, 2003

Where do we wish to plant our flag in cyberspace?