We forget the most important thing there is that we have to do – all we have to do is look for pin points, vulnerabilities, places where it could hurt – and then watch how long it takes for hackers to get in via our incidents
Jaya Baloo, CISO, KPN Telecom
When you think about the threats we’re facing, that’s where they are- attacks against elections, attacks against integrity. There’s someone manipulating the data. These things are going to become true, and very real, and very physical. There’s a world of difference between your spreadsheet crashes and you lose your data, or your car crashes and you lose your life. It might be same CPU, the same software, the same vulnerability, but wildly different consequences.
Bruce Schneier, Fellow, Harvard Kennedy School of Government; Internationally Renowned Security Technologist
Take every incident, every compromise like it’s going to be your last. Take it seriously.
Christopher C. Krebs, Director, Cybersecurity and Infrastructure Security Agency (CISA) Department of Homeland Security (DHS), USA
We’ve got to move to some kind of cognitive computational system that integrates machine learning, A.I., and an expert system. And we’ve got to have the ability to see events that hit each company and share them across companies within a sector to get sector-wide visibility and protection, and then share sector information with other sectors and the government for a comprehensive program. This is technically possible and it’ll happen.
Keith Alexander, CEO and president of IronNet, and former director the National Security Agency
If we look at adversity in the right way, we can harness its power to compel us all to do more in our industry, to fight a common adversary together. Adversity leveraged in the right way can only make us stronger, forcing us to focus on the outcomes that our cyber defenders need the most.
Chris Young, CEO, McAfee
We see cyber which has been an ongoing part of the daily competition between nations, now clearly will be part of conflict between nations.
Mike Rogers, Former Director of the NSA, Former Head of the U.S Cyber Command
Cybersecurity will use AI for both attack and defense, however, you need to have a human in the loop to make the decision on who gets targeted
Dame Wendy Hall, Regius Professor of Computer Science, University of Southampton
Whenever technology interfaces with base human behavior, the result is an amplification and an escalation. From a scientific point of view, this points to the mutation of behavior in cyber contexts… if we can figure out this amplification, then we can also figure out how to de-escalate.
Mary Aiken, Prominent Forensic Cyberpsychologist
We need to communicate and collaborate better. We obviously need to take a look at deceptive tech...we need to take a look at addressing organizations and we need to educate them and get them to listen... This gathering that we have here has the power to do so much good. Do some good, get out, communicate, collaborate.
Chris Roberts, Chief Security Strategist Attivo Networks