Talks in the Category "Type"
Page 9 of 15
Video: The Battle for Power on the Internet
Bruce Schneier gives us a glimpse of the future of the Internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.
Video: Surviving in a Feudal Security World
Bruce Schneier of the famed Schneier on Security blog puts security in the context of our allegiances to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.
Video: Talks at Google
Human society runs on trust. We all trust millions of people, organizations, and systems every day—and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don’t destroy the cooperative systems they’re abusing is an age-old problem, one that we’ve solved through morals and ethics, laws, and all sort of security technologies. Understanding how these all work—and fail—is essential to understanding the problems we face in today’s increasingly technological and interconnected world…
Video: 2 Minutes on BrightTALK: Security Versus Usability
“If security doesn’t work for the legitimate users, it won’t be used. So when you go to the enterprise, the first thing security has to do is not annoy people too much.” Renowned security blogger and pundit Bruce Schneier discusses the problems with security and usability and details what must be done to make a more secure interface.
Audio: Surviving in a Feudal Security World
Feudalism is an apt model for security today. We pledge our allegiance to service providers, and expect them to provide us with security in return. Too often, this security is completely opaque, with results all over the map. Navigating this new world of feudal security is going to be the major challenge for CISOs in the current decade. This talk examines both the challenges and the solutions.
Audio: Trust, Security, and Society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems—and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Ensuring defectors don’t destroy the very cooperative systems they’re abusing is an age-old problem. So society has developed a variety of pressures to induce cooperation: moral systems, reputational systems, institutional systems, and security systems. Understanding how these different societal pressures work—and fail—is essential to understanding the problems we face in today’s increasingly technological and interconnected world…
Video: Smashing the Future for Fun and Profit
Has it really been 15 years? Time flies when keeping up with Moore’s law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community—private, public, and independent practitioners alike could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them. Please join Black Hat for this very special session, as we bring together 5 of the original 1997-98 speakers: Jeff Moss, Bruce Schneier, Marcus Ranum, Adam Shostack, and Jennifer Granick to share their vision of security over the next 15 years. One of Black Hat’s core values is its focus on cutting edge research and emergent technologies. So there will be no war stories in this session. Each speaker will have the opportunity to deliver his or her own view. Based on the track records, take good notes…
Video: Bruce Schneier: Trust, Security, and Society (keynote from Hack in the Box Amsterdam)
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems—and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don’t destroy the very cooperative systems they’re abusing is an age-old problem, and we’ve developed a variety of societal pressures to induce cooperation: moral systems, reputational systems, institutional systems, and security systems. Understanding how these different societal pressures work—and fail—is essential to understanding the problems we face in today’s increasingly technological and interconnected world…
Video: Privacy in the Age of Big Data: What's Going On Out There?
On a panel at the Privacy in the Age of Big Data Forum in New Zealand, Bruce Schenier spoke about trends in personal data collection and usage.
Watch the Video on YouTube: Parts 1, 2, and 3
Read the Transcript on Privacy-PC.com
Video: Public Lecture on Liars and Outliers
Over 400 people turned out in person to hear Bruce Schneier’s lecture on the topic of his latest book Liars and Outliers. More than 1000 people viewed the live streaming of the event online. This event was hosted by the NZITF and was sponsored by InternetNZ and Telecom New Zealand.
Sidebar photo of Bruce Schneier by Joe MacInnis.