SlideShare une entreprise Scribd logo
1  sur  39
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma

Contenu connexe

Plus de Adrian Sanabria

Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
From due diligence to IoT disaster
From due diligence to IoT disasterFrom due diligence to IoT disaster
From due diligence to IoT disasterAdrian Sanabria
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?Adrian Sanabria
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps OverviewAdrian Sanabria
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsAdrian Sanabria
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresAdrian Sanabria
 
Why does InfoSec play bass?
Why does InfoSec play bass?Why does InfoSec play bass?
Why does InfoSec play bass?Adrian Sanabria
 

Plus de Adrian Sanabria (16)

Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
From due diligence to IoT disaster
From due diligence to IoT disasterFrom due diligence to IoT disaster
From due diligence to IoT disaster
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
 
Why does InfoSec play bass?
Why does InfoSec play bass?Why does InfoSec play bass?
Why does InfoSec play bass?
 

Dernier

Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Jon Hansen
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfscitechtalktv
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理cyebo
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictJack Cole
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxDilipVasan
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...Amil baba
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeralNABLAS株式会社
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp onlinebalibahu1313
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group MeetingAlison Pitt
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理cyebo
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyRafigAliyev2
 
Generative AI for Trailblazers_ Unlock the Future of AI.pdf
Generative AI for Trailblazers_ Unlock the Future of AI.pdfGenerative AI for Trailblazers_ Unlock the Future of AI.pdf
Generative AI for Trailblazers_ Unlock the Future of AI.pdfEmmanuel Dauda
 

Dernier (20)

Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
Machine Learning for Accident Severity Prediction
Machine Learning for Accident Severity PredictionMachine Learning for Accident Severity Prediction
Machine Learning for Accident Severity Prediction
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
 
Generative AI for Trailblazers_ Unlock the Future of AI.pdf
Generative AI for Trailblazers_ Unlock the Future of AI.pdfGenerative AI for Trailblazers_ Unlock the Future of AI.pdf
Generative AI for Trailblazers_ Unlock the Future of AI.pdf
 

Notes de l'éditeur

  1. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  2. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  3. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  4. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  5. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  6. We're already one of the fastest growing industries Everyone with experience in cybersecurity is guaranteed a job for life VCs and PE firms have been dumping money in this space like crazy Dumping money in this space... we might be on to something here... 1. Comfort myths and lies - we *****want***** recycling to work, because the alternative is a feeling of helplessness - we *****want***** switching to an electric car and buying carbon credits to work for the same reasons - so we tell ourselves, and our customers (carbon neutral advertising - maybe from Hello Fresh) these “comfort lies” until we begin to believe them ourselves ethics suddenly get more flexible 2. Fake it til you make it Theranos raised a billion dollars because we were EAGER TO BELIEVE 3. burden of proof there are a lot of scenarios in security where's it's very difficult to measure value people can, and will, take advantage of that
  7. A bit of a tease here - see if you can spot the pattern
  8. Vendors, industry analysts, investors, even defenders... are eager to see their suspicions confirmed... and to get validation for what they do. InfoSec is FULL of mission-oriented folks that don't just do this for the money, this is also a calling for them. They have a deep desire to hear that what they do makes a difference; makes the world a safer place. Vendors and investors desire market fit; validation that they're building the right product at the right time to get that evasive 100x return Lies and myths are welcomed with open arms
  9. Sunk cost fallacy is also an issue here how do you think someone feels when they find out they've been spreading a myth in every sales conversation for the past 2 years? Some recover and stop Others just continue THIS is where a myth becomes a lie People often wonder if scenarios like Theranos were always a scam, or if there was a turning point. I believe most start out with good intentions My theory is that the turning point is often a sunk cost decision
  10. Cybercrime will cause $10.5 trillion in damages in 2023? 146 billion records will be stolen? Over the last two decades, nearly every credit card in the world was exposed in a data breach and what was the impact? It was impossible for carders to monetize even a tiny fraction of the data stolen It wasn't scalable 146 records stolen 45 million credit cards exposed $2.9 billion dollars per minute? WHY NOT 100 million port scans blocked at the firewall it's all meaningless
  11. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  12. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  13. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  14. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  15. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  16. What's the first thing you think when you see these numbers? I think: what's Germany's GDP? Is it less than this? What's the number for fraud globally? How much in ransom payments were paid last year? Yes, in fact, Germany's GDP is less than $6 trillion dollars. Global fraud is less than this Ransomware, one of the biggest issues in our industry, hasn't topped $1B yet in fact ransom payments decreased by 40% in 2022 compared to 2021 so you're telling me that ransomware payments are less than a sixth of a percent of total cybercrime damages? there's no way! And in fact, there's absolutely no data behind stats like these $6T is more than all the insurance premiums paid globally! That includes ALL insurance, not just cybersecurity insurance that's life insurance, car insurance, giant container ship insurance, pet insurance, cancel my flight insurance best buy replacement plan on my Dyson vacuum insurance This is a genius business move: Step1: understand what vendors need or want to hear Step2: create an impressive sounding PR/marketing business that advertises itself as a research firm Step3: create great sound bytes - facts optional, post them everywhere e.g. Steve Morgan "contributes" to Forbes and cites Forbes as the source for Cybersecurity Ventures' research Then the New York Times, CNBC, Comptia, the SEC can all cite Cybersecurity Ventures as a source Step4: profit - create tons of "research papers" for vendors Unfortunately, this is one stat that's correct. Steve Morgan has been WILDLY successful in getting his stats repeated EVERYWHERE
  17. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  18. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  19. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  20. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  21. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  22. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  23. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  24. Let's take a closer look at one of these stats. First off, TRUST YOUR GUT. If it sounds like BS, it's worth investigating. In 2017, I set out to document every company that had ever been destroyed by a breach. How many did I find? Only 23 over a 20 year period. All small businesses; maybe 4 had over 100 employees, but all less than 500 Is it possible I missed some, or some didn't get reported? Sure! Is it possible I'm missing 150 PER YEAR? Probably not. This answers a more broad and general assumption in our industry: the assumption that security incidents MUST be ending companies Ramon Ray: founder and owner of smallbiztechnology.com and Smart Hustle. He was still using the stat as recently as late 2021, five years after NextGov interviewed him for their article debunking this claim. And that's at the core of what we're talking about here: there are a lot of folks out there that won't let the truth get in the way of a good sound byte
  25. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  26. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  27. This is demotivating rhetoric at its worst. Many defenders are all too happy to accept that they're powerless. Humans the weakest link? Uh, no - whoever fails to build a human-safe environment is the weakest link!
  28. I learned many things from Wendy Nather, but one of the most important and useful lessons was to slow down, check my claims and statements, and make sure everything I'm saying was DEFENSIBLE.When we worked as analysts, everyone loved writing up a hot take on a topic, but it needed to be examined from multiple perspectives. It needed to be clearly stated as opinion or fact. It needed receipts, attributions, and references to back it up in case there's anger, blowback, or whatever else. Wendy would always back me up, as long as I wasn't talking out my ass and gave her something DEFENSIBLE to defend.This is all I'm asking here, and the main thing I want you to take away from this talk. Posting to twitter, writing a blog, working with marketing - take a little bit of extra time to make sure what you're sharing is true and defensible.And if you're feeling really spicy, help me out in challenging all the indefensible myths and lies out there.
  29. This is my conclusion cassowary He wants you to factor in some extra time for fact checks