Talks in the Category "Video"
Page 8 of 13
Video: Technical Plenary: Hardening the Internet
A technical plenary featuring security researcher Bruce Schneier along with IETF leaders Brian Carpenter, Stephen Farrell and others.
New reports of large-scale Internet traffic monitoring appear almost every day. We were all aware that targeted interception was taking place, but the scale and scope in the recent reports is surprising. Such scale was not envisaged during the design of many Internet protocols; the threat is quite different than expected. Now, the Internet community must consider the consequences.
While details of these attack techniques remain largely unknown, we can talk about possible ways to harden the Internet in light of pervasive Internet monitoring. We can take a closer look at our protocols and the security properties that they provide…
Video: The Battle for Power on the Internet
Bruce Schneier gives us a glimpse of the future of the Internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.
Video: Surviving in a Feudal Security World
Bruce Schneier of the famed Schneier on Security blog puts security in the context of our allegiances to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.
Video: Talks at Google
Human society runs on trust. We all trust millions of people, organizations, and systems every day—and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don’t destroy the cooperative systems they’re abusing is an age-old problem, one that we’ve solved through morals and ethics, laws, and all sort of security technologies. Understanding how these all work—and fail—is essential to understanding the problems we face in today’s increasingly technological and interconnected world…
Video: 2 Minutes on BrightTALK: Security Versus Usability
“If security doesn’t work for the legitimate users, it won’t be used. So when you go to the enterprise, the first thing security has to do is not annoy people too much.” Renowned security blogger and pundit Bruce Schneier discusses the problems with security and usability and details what must be done to make a more secure interface.
Video: Smashing the Future for Fun and Profit
Has it really been 15 years? Time flies when keeping up with Moore’s law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community—private, public, and independent practitioners alike could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them. Please join Black Hat for this very special session, as we bring together 5 of the original 1997-98 speakers: Jeff Moss, Bruce Schneier, Marcus Ranum, Adam Shostack, and Jennifer Granick to share their vision of security over the next 15 years. One of Black Hat’s core values is its focus on cutting edge research and emergent technologies. So there will be no war stories in this session. Each speaker will have the opportunity to deliver his or her own view. Based on the track records, take good notes…
Video: Bruce Schneier: Trust, Security, and Society (keynote from Hack in the Box Amsterdam)
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems—and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don’t destroy the very cooperative systems they’re abusing is an age-old problem, and we’ve developed a variety of societal pressures to induce cooperation: moral systems, reputational systems, institutional systems, and security systems. Understanding how these different societal pressures work—and fail—is essential to understanding the problems we face in today’s increasingly technological and interconnected world…
Video: Privacy in the Age of Big Data: What's Going On Out There?
On a panel at the Privacy in the Age of Big Data Forum in New Zealand, Bruce Schenier spoke about trends in personal data collection and usage.
Watch the Video on YouTube: Parts 1, 2, and 3
Read the Transcript on Privacy-PC.com
Video: Public Lecture on Liars and Outliers
Over 400 people turned out in person to hear Bruce Schneier’s lecture on the topic of his latest book Liars and Outliers. More than 1000 people viewed the live streaming of the event online. This event was hosted by the NZITF and was sponsored by InternetNZ and Telecom New Zealand.
Sidebar photo of Bruce Schneier by Joe MacInnis.