Download presentation
Presentation is loading. Please wait.
Published byCameron Quinn Modified over 9 years ago
1
FCC Broadband Workshop on Cyber Security Don Welch President and CEO Merit Network, Inc.
2
First l Understand the threat l Not techniques, but intentions and capabilities l Our adversaries are people l They are smart l They learn and adapt l They can focus more time, energy and resources when and where they choose
3
The Threat l State Agencies l Espionage – diplomatic, military, commercial l Destruction – government, military, critical infrastructure l Criminals l Money l Terrorists l Espionage l Destruction/Publicity l Pseudo State Agencies l Harassment l Hobbyists l Notoriety l Petty cash
4
Trade-offs l ROI is “negative” on security investments l Return is things that didn’t happen l It is hard to build support for loss of usefulness l We can’t stop everything Security UsefulnessCost
5
Defense In Depth l Technology l Security products l Non-security products l Policy l People l Our adversaries are people l Physical l A backhoe can be more effective than a “sploit” l Virtual l Broadband is used by the attackers and the defenders
6
Conclusion l Don’t mandate how l Too hard/Doesn’t work in practice l Mandate results l Not easy, but leverages our strengths
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.