Cyber Next Summit Track (CNS) | Borderless Cyber Track (BC) | Joint CNS-BC Plenary Session Grand Ballroom
Oct 10, 2019 09:00 AM - 09:30 AM(America/Chicago)
20191010T0900 20191010T0930 America/Chicago Plenary Session— Keynote: Managing the Space-Time Continuum of Cyberdefense

Attackers in cyberspace seem overwhelming, but they are not superhuman. Attackers also have a budget, a boss, an objective, and their own "risk model" of behavior. Our goal is not to create a perfect defense, but instead to dynamically manage defenses that: force the attacker into less space; and allow the defender to deal with them earlier in time. At its heart, cyberdefense is a decision-making, risk-managing machine, fueled by information. 

Narrowing attack opportunities through prevention, threat intelligence, automation, interrupting attacker life-cycle, rapid detection and effective response – these are all crucial defensive actions that need to be seen as part of a holistic cyberdefense machine that manages space and time to defensive advantage. In this talk, we will discuss various models and the dynamics of cyberdefense, and set the stage for the role of automation and orchestration to empower this machinery. 

Grand Ballroom Borderless Cyber USA / Washington, D.C. / 8-10 October 2019 events@oasis-open.org

Attackers in cyberspace seem overwhelming, but they are not superhuman. Attackers also have a budget, a boss, an objective, and their own "risk model" of behavior. Our goal is not to create a perfect defense, but instead to dynamically manage defenses that: force the attacker into less space; and allow the defender to deal with them earlier in time. At its heart, cyberdefense is a decision-making, risk-managing machine, fueled by information. 

Narrowing attack opportunities through prevention, threat intelligence, automation, interrupting attacker life-cycle, rapid detection and effective response – these are all crucial defensive actions that need to be seen as part of a holistic cyberdefense machine that manages space and time to defensive advantage. In this talk, we will discuss various models and the dynamics of cyberdefense, and set the stage for the role of automation and orchestration to empower this machinery. 

Senior Vice President and Chief Evangelist
,
The Center for Internet Security, Inc. (CIS)
Program Navigator