18
Cybersecurity: How to Use What We Already Know Jean Yang Privacy. Security. Risk. October 1, 2015 @jeanqasaur

Cybersecurity: How to Use What We Already Know

  • Upload
    jxyz

  • View
    2.450

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity: How to Use What We Already Know

Cybersecurity:How to Use What

We Already KnowJean Yang

Privacy. Security. Risk.October 1, 2015

@jeanqasaur

Page 2: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Our Future Runs on Software

Smart homes Driverless cars Automatic dating

But first we need to “solve” security!

Page 3: Cybersecurity: How to Use What We Already Know

@jeanqasaur

State of the ArtResearch Industry

Undo mechanism

s

Encrypted databases

Program analyses

Provably secure

software

Firewalls

The big question:How can we take

advantage of research ideas in practice?

Page 4: Cybersecurity: How to Use What We Already Know

@jeanqasaur

This Talk

Companies

Venture

capital

Startups

Academia

Policy makers

Consumers

How can we connect

researchers to everyone else?

Page 5: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Part I:What Do Researchers Know?

Page 6: Cybersecurity: How to Use What We Already Know

Jean Yang / Jeeves 6

State of the art.

The Programming Perspective:We Still Live in the 1970s

Permissions checks are required across the code.

Page 7: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Policy-Agnostic ProgrammingMy PhD work. Programs attach policies to data. The rest of the code may be policy-agnostic.

Programming model provides mathematical

guarantees.

Implementation strategy scales for real-world

programs.jeeveslang.org

Page 8: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Policy-Agnostic Programming for Our 21st Century Security Concerns

Model View ControllerWithout

automatic policy enforcement

With Jacqueline, a policy-agnostic web framework that extends Python’s

Djangojeeveslang.org

Page 9: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Part II:How Can We Use Research to Build Secure Software?

Page 10: Cybersecurity: How to Use What We Already Know

Barriers to Industry Adoption•Managers need to fight status quo.•Programmers need to manage legacy code.

@jeanqasaur

What about the startup route to tech transfer?

Page 11: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Security is no TindogThe Hot New Silicon Valley

Startup

Startup that Helps Us Build

Secure Software

Fun concept. Slick design. Toddler nephew can use it. Integrates

with your life.

Technical concept. Verifiable by experts.

Requires infrastructure change.

Page 12: Cybersecurity: How to Use What We Already Know

Unique Challenges for Security Startups

@jeanqasaur

Justin Somaini, Chief Trust Officer

•Concept is highly technical.•No flashy demos.•Adoption requires client expertise and/or trust.•Solving a technical problem != building a product.

Page 13: Cybersecurity: How to Use What We Already Know

Cybersecurity Factory

$20,000

@jeanqasaur

Raj Shah

Office space Focused mentorship

A network David Ting

An 8-week accelerator I started that gives teams:

Legal support

Maxwell Krohn

cybersecurityfactory.com

Page 14: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Part III:How To Motivate Customers to Pay for Security?

Page 15: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Insecurity is Expensive“A report released this month by the Atlantic Council and Zurich Insurance Group estimated that by 2030, an insecure Internet would reduce global economic net benefit by $90 trillion. In contrast, a completely secure Internet would result in a global net gain of $190 trillion.”

-Jeff Kosseff, cybersecurity law professor

Page 16: Cybersecurity: How to Use What We Already Know

@jeanqasaur

The Security “Prisoner’s Dilemma”

Lack of individual incentive:•Requires more employee training.•Requires more programmer effort.•Doesn’t currently provide competitive advantage.

Page 17: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Creating a Culture Around CaringConsumer Example: Snapchat

Numerous privacy violations, but valued at

$16 billion with 100 million users.

Policy Example: Dentists

Common to email records in violation of HIPAA, but HHS does

not audit.

Page 18: Cybersecurity: How to Use What We Already Know

@jeanqasaur

Summary: How to Secure Software

1. Ask smart people to come up with technical solutions.

2. Put solutions into practice.

3. Iterate.

@jeanqasaurjeanyang.co

m

Connect research with industry.

Change incentives for security.

Communicate and educate!