Suits and Spooks Washington DC 2014: Complete Video Compilation
By O'Reilly Media, Inc.
Publisher: O'Reilly Media
Final Release Date: March 2014
Run time: 7 hours 22 minutes
Have data breaches among large retailers heightened your concerns about cyber-crime? Now you can be a fly on the wall at Suits and Spooks Washington, D.C., the unique technology event that helps unmask the cold realities of cyber conflict, espionage, and crime. With this complete video compilation, you can catch many of the eyebrow-raising sessions from the January 2014 conference.
Taia Global’s Suits and Spooks Collision event brings individuals from the U.S. Intelligence Community together with innovators and executives from a wide variety of private sector disciplines, including technology, finance, entertainment, and science. The result is two days of frank discussions, challenging perspectives, and collaborative problem solving.
Here are some of the sessions included in this video package:
Use of Automated Behavioral Analysis to Anticipate Cyber Attacks—Robert Zitz, Sr. VP at Leidos, and 32-year veteran of the Intelligence Community
The Importance of Critical Thinking when Evaluating Cyber Threat Intelligence––Carmen Medina, Career senior national security executive at CIA (retired), including Director for the Center of the Study of Intelligence and Deputy Director of Intelligence.
Un-masking the Stealthy Hacker––Lance Cottrell, Founder / Chief Scientist of Anonymizer Inc., Chief Scientist of Ntrepid Corp.
The Supply Chain: A Nearly Invisible Attack Vector—panel discussion including Larry Castro (The Chertoff Group; at NSA for 44 years), Rick Holland (Forrester Research), Harry Wingo (West River Solutions LLC; former Navy SEAL officer), Eric O’Neill (The Georgetown Group; former FBI operative), and Stephen Boyer (BitSight Technologies)
How Organizations can Leverage Data to Observe Risk and Assess Opportunities—Oren J. Falkowitz, President, Thursday Strategies; former at Director of Technology and Data Science Programs at US Cyber Command
Is the Cloud and Virtualization an Attacker’s Dream or Nightmare?—panel discussion including Christofer Hoff (Juniper Networks; founding member of Cloud Security Alliance), Anup Ghosh (Invincea; formerly at DARPA), Kurt Baumgartner (Kaspersky Lab), and Barbara Hunt (Cutting Edge C.A.; formerly at the NSA and CIA)
Comments about oreilly Suits and Spooks Washington DC 2014: Complete Video Compilation:
Suit and Spooks is a conference that presents and discusses the current trends in the world of cyber defense and security. The topics cover wide areas and are varied such as attacks, threats and methods in the cyberspace. That video compilation are the records of all the presentations of the conference from 2014 in Washington DC.
The covered security issues concern, for instance, the "internet of things", the management of the security economics, the human element in a secured system, or the border effects of encryption algorithm or security protocol weakening.
The quality of the topic selection and the videos is undeniable. The presentation, that embed the slides, are available in high definition, and can be downloaded or streamed directly from the O'reilly account The stakeholders are also well chosen and treat their subject with, most of the time, great accuracy.
The conference is security- and risk assessment-oriented. Since only the first talks cover cryptographic choice and standards, you should not expect theoretical cryptographic topics. There are two kind of chapters: the keynotes and the panel discussions. The first kind is known by most of us, but the second covers a topic or a subject through the different points of view of different stakeholders.
For instance, I have particularly appreciated the conference of Carmen Medina, a retired CIA analyst. She discusses her past in the CIA and the importance of critical thinking when you observe the data, and that, sometimes, the appliances are deceptive. The discussion panel debating about the internet of things capture the real issues that surrounds the introduction of this technology in our everyday life. Another chapter, that I have also appreciated, is the first talk showing that weakening some standards can have side effects on the security of our own defensive systems.
Finally, the conference is really instructive and the various subjects are covered with accuracy avoid the annoyance of the viewer. The quality is more than correct, and, if you are interested in security, I recommend their visioning. I have attended many conference, but this one is the first virtual one that I follow and... I was very positively surprised.
Bottom Line Yes, I would recommend this to a friend