SlideShare a Scribd company logo
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma

More Related Content

PPTX
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
PPTX
Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...
PPTX
Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...
PDF
2019 InfoSec Buyer's Guide
PPTX
Equifax Breach Postmortem
PPTX
The New Security Practitioner
PPTX
The state of endpoint defense in 2021
PDF
The Products We Deserve
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...
Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...
2019 InfoSec Buyer's Guide
Equifax Breach Postmortem
The New Security Practitioner
The state of endpoint defense in 2021
The Products We Deserve

More from Adrian Sanabria (16)

PPTX
Securing Systems - Still Crazy After All These Years
PPTX
Red Team Framework
PPTX
From due diligence to IoT disaster
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PPTX
Open Source Defense for Edge 2017
PPTX
451 AppSense Webinar - Why blame the user?
PPTX
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PPTX
Security and DevOps Overview
PPTX
2016 virus bulletin
PPTX
RSAC 2016: CISO's guide to Startups
PPTX
Cloud, DevOps and the New Security Practitioner
PPTX
Ten Security Product Categories You've Probably Never Heard Of
PPTX
Ten security product categories you've (probably) never heard of
PPTX
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
PPTX
Why does InfoSec play bass?
Securing Systems - Still Crazy After All These Years
Red Team Framework
From due diligence to IoT disaster
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Open Source Defense for Edge 2017
451 AppSense Webinar - Why blame the user?
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Cylance - The Roadmap To Better Endpoint Security
Security and DevOps Overview
2016 virus bulletin
RSAC 2016: CISO's guide to Startups
Cloud, DevOps and the New Security Practitioner
Ten Security Product Categories You've Probably Never Heard Of
Ten security product categories you've (probably) never heard of
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Why does InfoSec play bass?
Ad

Recently uploaded (20)

PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPT
Quality review (1)_presentation of this 21
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
annual-report-2024-2025 original latest.
PDF
Mega Projects Data Mega Projects Data
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
SAP 2 completion done . PRESENTATION.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Introduction to the R Programming Language
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Quality review (1)_presentation of this 21
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
annual-report-2024-2025 original latest.
Mega Projects Data Mega Projects Data
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
SAP 2 completion done . PRESENTATION.pptx
Database Infoormation System (DBIS).pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
ISS -ESG Data flows What is ESG and HowHow
Introduction to the R Programming Language
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Ad

Editor's Notes

  • #4: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #5: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #6: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #7: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #8: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #9: We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  • #10: A bit of a tease here - see if you can spot the pattern
  • #11: Vendors, industry analysts, investors, even defenders... are eager to see their suspicions confirmed... and to get validation for what they do. InfoSec is FULL of mission-oriented folks that don't just do this for the money, this is also a calling for them. They have a deep desire to hear that what they do makes a difference; makes the world a safer place. Vendors and investors desire market fit; validation that they're building the right product at the right time to get that evasive 100x return Lies and myths are welcomed with open arms
  • #12: Sunk cost fallacy is also an issue here how do you think someone feels when they find out they've been spreading a myth in every sales conversation for the past 2 years? Some recover and stop Others just continue THIS is where a myth becomes a lie People often wonder if scenarios like Theranos were always a scam, or if there was a turning point. I believe most start out with good intentions My theory is that the turning point is often a sunk cost decision
  • #15: Cybercrime will cause $10.5 trillion in damages in 2023? 146 billion records will be stolen? Over the last two decades, nearly every credit card in the world was exposed in a data breach and what was the impact? It was impossible for carders to monetize even a tiny fraction of the data stolen It wasn't scalable 146 records stolen 45 million credit cards exposed $2.9 billion dollars per minute? WHY NOT 100 million port scans blocked at the firewall it's all meaningless
  • #18: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #19: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #20: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #21: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #22: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #23: What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  • #25: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #26: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #27: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #28: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #29: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #30: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #31: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #32: Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  • #34: This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  • #35: This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  • #36: This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  • #39: I learned many things from Wendy Nather, but one of the most important and useful lessons was to slow down, check my claims and statements, and make sure everything I'm saying was DEFENSIBLE.When we worked as analysts, everyone loved writing up a hot take on a topic, but it needed to be examined from multiple perspectives. It needed to be clearly stated as opinion or fact. It needed receipts, attributions, and references to back it up in case there's anger, blowback, or whatever else. Wendy would always back me up, as long as I wasn't talking out my ass and gave her something DEFENSIBLE to defend.This is all I'm asking here, and the main thing I want you to take away from this talk. Posting to twitter, writing a blog, working with marketing - take a little bit of extra time to make sure what you're sharing is true and defensible.And if you're feeling really spicy, help me out in challenging all the indefensible myths and lies out there.
  • #40: This is my conclusion cassowary He wants you to factor in some extra time for fact checks