SlideShare a Scribd company logo
SESSION ID:
#RSAC
Hugh Thompson, Ph.D.
Introduction and A Look at
Security Trends
Program Committee, RSA Conference
Twitter: @DrHughThompson
BAS-M01
SESSION ID:
Introduction and a Look at Security Trends
#RSAC
Agenda
Intro to Information Security
Security Trends
Economics of Information Security
#RSAC
The Shifting IT
Environment
(…or why security has become so important)
#RSAC
Shift: Compliance and Consequences
The business has to adhere to regulations, guidelines, standards,…
SAS 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems)
PCI DSS – requirements on companies that process payment cards
HIPAA, GLBA, BASEL II, …, many more
Audits have changed the economics of risk and create an “impending
event”
Hackers may attack you but auditors will show up
Disclosure laws mean that the consequences of failure have
increased
Waves of disclosure legislation
#RSAC
Shift: Technology
• Many applications/transactions now operate over the web
• Cloud is changing our notion of a perimeter
• Worker mobility is redefining the IT landscape
• Shadow IT is becoming enterprise IT
• Majority of web transactions are now encrypted (SSL)
• The security model has changed from good people vs. bad people
to enabling partial trust
– There are more “levels” of access: Extranets, partner access, customer
access, identity management, …
#RSAC
Shift: Attackers
 Cyber criminals are becoming organized and profit-driven
 An entire underground economy exists to support cybercrime
 Attackers are shifting their methods to exploit both technical and human
weaknesses
 Attackers after much more than traditional monetizable data (PII, etc.)
 Hacktivism
 State-sponsored attacks
 IP attacks/breaches
#RSAC
Shift: Customer expectations
Customers, especially businesses, are using security as
a discriminator
In many ways security has become a non-negotiable
expectation of businesses
Security being woven into service level agreements
(SLAs)
The “average person” is now familiar with security
#RSAC
Big Questions
How do you communicate the value of security to the enterprise (and management)?
How do you measure security?
How do you rank risks?
How do you reconcile security and compliance?
How can you be proactive and not reactive? What is “security intelligence” and how would you
actually consume, act on or share it?
What changes are likely in privacy laws, data sovereignty, trust?
What about big issues in the news like breaches of very personal data that cannot be reset or
revoked? How should/can we adapt what we do based on them?
How do you adapt to new paradigms like IoT?
#RSAC
The Economics of Security
#RSAC
Hackernomics (noun)
A social science concerned chiefly with description
and analysis of attacker motivations, economics,
and business risk. Characterized by
5 fundamental immutable laws and 4 corollaries
#RSAC
Law 1
Most attackers aren’t evil or insane; they just
want something
Corollary 1.a.:
We don’t have the budget to protect against evil people but we can protect
against people that will look for weaker targets
#RSAC
Law 2
Security isn’t about security. It’s about
mitigating risk at some cost.
Corollary 2.a.:
In the absence of metrics, we tend to over focus on risks that are either
familiar or recent.
#RSAC
Law 3
Most costly breaches come from simple
failures, not from attacker ingenuity
Corollary 3.a.:
Bad guys can, however, be VERY creative if properly incentivized.
#RSAC
The CAPTCHA Dilemma
Completely
Automated
Public
Turing test to tell
Computers and
Humans
Apart
#RSAC
Law 4
In the absence of security education or experience,
people (employees, users, customers, …) naturally
make poor security decisions with technology
Corollary 4.a.:
Systems needs to be easy to use securely and difficult to use insecurely
#RSAC
#RSAC
Law 5
Attackers usually don’t get in by cracking some
impenetrable security control, they look for
weak points like trusting employees
#RSAC
A Visual Journey of Security
Trends
2008
#RSAC
2015 Submission + Abstract Titles2015 Submission Titles + Quick Abstract
22
#RSAC
2016 Sbumssion Titles + Abstract016 16
Submission + Abstract Titles2016 Submission Titles + Quick Abstract
23
#RSAC
Some hot areas…
Hot topics:
Internet of Things (IoT) security
Data sovereignty and legislative volatility
Cyber Insurance
Privacy vs. Security
Of particular intrigue
Breaches – implications of the theft of persistent PII
24
#RSAC
#RSAC
Enjoy the rest of the conference!!

More Related Content

PDF
Intelligent Application Security
PDF
Rise of the Hacking Machines
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
State of Cybersecurity: 2016 Findings and Implications
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Pulling our-socs-up
PPTX
LIFT OFF 2017: Transforming Security
Intelligent Application Security
Rise of the Hacking Machines
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
DON'T Use Two-Factor Authentication...Unless You Need It!
State of Cybersecurity: 2016 Findings and Implications
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Pulling our-socs-up
LIFT OFF 2017: Transforming Security

What's hot (20)

PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PPTX
Cybersecurity: How to Use What We Already Know
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PPTX
INFINITY Presentation
PDF
Security - intelligence - maturity-model-ciso-whitepaper
PPTX
Cyber Defense Matrix: Reloaded
PDF
Sizing the Cyber Skills Gap
PPTX
IOT Security FUN-damental
PPTX
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
PPTX
Cyber threat intelligence: maturity and metrics
PDF
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
PDF
Cyber intelligence for corporate security
PDF
How Machine Learning & AI Will Improve Cyber Security
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PDF
Hacking Cracking 2008
PPTX
Kent King - PKI: Do You Know Your Exposure?
PDF
Blueliv Corporate Brochure 2017
Insights from-NSAs-cybersecurity-threat-operations-center
LIFT OFF 2017: Ransomware and IR Overview
Cybersecurity: How to Use What We Already Know
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
INFINITY Presentation
Security - intelligence - maturity-model-ciso-whitepaper
Cyber Defense Matrix: Reloaded
Sizing the Cyber Skills Gap
IOT Security FUN-damental
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cyber threat intelligence: maturity and metrics
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
Cyber intelligence for corporate security
How Machine Learning & AI Will Improve Cyber Security
DATA LOSS PREVENTION OVERVIEW
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Hacking Cracking 2008
Kent King - PKI: Do You Know Your Exposure?
Blueliv Corporate Brochure 2017
Ad

Similar to Introduction and a Look at Security Trends (20)

PDF
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
PPTX
Week 1&2 intro_ v2-upload
PDF
A New Security Paradigm for IoT (Internet of Threats)
PDF
Security, Audit and Compliance: course overview
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PPT
Main Menu
PPT
Cobit 2
PPTX
Matt_Cyber Security Core Deck September 2016.pptx
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
PPTX
Track-2307_KUKREJA.potx
PPTX
Module 1Introduction to cyber security.pptx
PDF
Introduction to the Current Threat Landscape
PPTX
Netwatcher Credit Union Tech Talk
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PDF
CounterTack: 10 Experts on Active Threat Management
PDF
Sem 001 sem-001
PPTX
Introduction-to-Cybersecurit57hhfcbbcxxx
PPTX
What i learned at issa international summit 2019
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
Week 1&2 intro_ v2-upload
A New Security Paradigm for IoT (Internet of Threats)
Security, Audit and Compliance: course overview
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Main Menu
Cobit 2
Matt_Cyber Security Core Deck September 2016.pptx
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
Track-2307_KUKREJA.potx
Module 1Introduction to cyber security.pptx
Introduction to the Current Threat Landscape
Netwatcher Credit Union Tech Talk
100+ Cyber Security Interview Questions and Answers in 2022
CounterTack: 10 Experts on Active Threat Management
Sem 001 sem-001
Introduction-to-Cybersecurit57hhfcbbcxxx
What i learned at issa international summit 2019
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I

Introduction and a Look at Security Trends

  • 1. SESSION ID: #RSAC Hugh Thompson, Ph.D. Introduction and A Look at Security Trends Program Committee, RSA Conference Twitter: @DrHughThompson BAS-M01
  • 4. #RSAC Agenda Intro to Information Security Security Trends Economics of Information Security
  • 5. #RSAC The Shifting IT Environment (…or why security has become so important)
  • 6. #RSAC Shift: Compliance and Consequences The business has to adhere to regulations, guidelines, standards,… SAS 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) PCI DSS – requirements on companies that process payment cards HIPAA, GLBA, BASEL II, …, many more Audits have changed the economics of risk and create an “impending event” Hackers may attack you but auditors will show up Disclosure laws mean that the consequences of failure have increased Waves of disclosure legislation
  • 7. #RSAC Shift: Technology • Many applications/transactions now operate over the web • Cloud is changing our notion of a perimeter • Worker mobility is redefining the IT landscape • Shadow IT is becoming enterprise IT • Majority of web transactions are now encrypted (SSL) • The security model has changed from good people vs. bad people to enabling partial trust – There are more “levels” of access: Extranets, partner access, customer access, identity management, …
  • 8. #RSAC Shift: Attackers  Cyber criminals are becoming organized and profit-driven  An entire underground economy exists to support cybercrime  Attackers are shifting their methods to exploit both technical and human weaknesses  Attackers after much more than traditional monetizable data (PII, etc.)  Hacktivism  State-sponsored attacks  IP attacks/breaches
  • 9. #RSAC Shift: Customer expectations Customers, especially businesses, are using security as a discriminator In many ways security has become a non-negotiable expectation of businesses Security being woven into service level agreements (SLAs) The “average person” is now familiar with security
  • 10. #RSAC Big Questions How do you communicate the value of security to the enterprise (and management)? How do you measure security? How do you rank risks? How do you reconcile security and compliance? How can you be proactive and not reactive? What is “security intelligence” and how would you actually consume, act on or share it? What changes are likely in privacy laws, data sovereignty, trust? What about big issues in the news like breaches of very personal data that cannot be reset or revoked? How should/can we adapt what we do based on them? How do you adapt to new paradigms like IoT?
  • 12. #RSAC Hackernomics (noun) A social science concerned chiefly with description and analysis of attacker motivations, economics, and business risk. Characterized by 5 fundamental immutable laws and 4 corollaries
  • 13. #RSAC Law 1 Most attackers aren’t evil or insane; they just want something Corollary 1.a.: We don’t have the budget to protect against evil people but we can protect against people that will look for weaker targets
  • 14. #RSAC Law 2 Security isn’t about security. It’s about mitigating risk at some cost. Corollary 2.a.: In the absence of metrics, we tend to over focus on risks that are either familiar or recent.
  • 15. #RSAC Law 3 Most costly breaches come from simple failures, not from attacker ingenuity Corollary 3.a.: Bad guys can, however, be VERY creative if properly incentivized.
  • 16. #RSAC The CAPTCHA Dilemma Completely Automated Public Turing test to tell Computers and Humans Apart
  • 17. #RSAC Law 4 In the absence of security education or experience, people (employees, users, customers, …) naturally make poor security decisions with technology Corollary 4.a.: Systems needs to be easy to use securely and difficult to use insecurely
  • 18. #RSAC
  • 19. #RSAC Law 5 Attackers usually don’t get in by cracking some impenetrable security control, they look for weak points like trusting employees
  • 20. #RSAC A Visual Journey of Security Trends
  • 21. 2008
  • 22. #RSAC 2015 Submission + Abstract Titles2015 Submission Titles + Quick Abstract 22
  • 23. #RSAC 2016 Sbumssion Titles + Abstract016 16 Submission + Abstract Titles2016 Submission Titles + Quick Abstract 23
  • 24. #RSAC Some hot areas… Hot topics: Internet of Things (IoT) security Data sovereignty and legislative volatility Cyber Insurance Privacy vs. Security Of particular intrigue Breaches – implications of the theft of persistent PII 24
  • 25. #RSAC
  • 26. #RSAC Enjoy the rest of the conference!!