2019 National Cyber Summit

Summit Speaker Winn Schwartau

Session Information

How to Measure the Security of your Network Defenses
Thursday, June 6, 2019 1:15 p.m. - 2:00 p.m.
To defend networks, we should be able to measure their security performance. I’m going to show you the exact techniques to measure the security of portions of your internal networks, such as anti-virus, malware and anomalous event detection. Then we will apply the same techniques to compare the security of classes of protective security products even though vendors don’t supply such specifications.


It all begins with my first career, Rock’n’Roll and being an Analogue audio engineer. Then we travel to Warsaw and Perth to discover the roots of Analogue Network Security… then!
You will see how to measure security and compare the effectiveness of protective devices as a function of time. We will call BB any vendor’s Black Box that performs any abstract security service. The internal process mechanism is immaterial to system measurement; signature-based A/V, rule-based binary decision making, heuristics, deep learning or any possible hybrid

It’s still a Black Box. With Time Based Security as the premise, we first show how to measure D(t), detection efficacy as a function of time. Then we will show how the injection of ‘hostile’ test code can create a time-based metric for product comparison. By varying the sensitivity of detection criteria, especially with ‘smart’ systems, we can see how which kinds of hostile code will trigger the BB’s detection mechanism. (This is a non-vendor presentation!) The time difference between those two numbers is your current, accurately measured Detection Time, or T(1) – T(0) = D(t) The second step in measuring security in the time domain is to continue to Reaction. The Detection Trigger stops the primary clock and begins the reaction measurement process, up to and including remediation, all in the time-domain.

R(t). The measurement of D(t) + R(t) gives us the maximum exposure to the system (process, etc.) equaling E(t), Exposure Time. How do your products and services really perform? Measuring security in the time domain for cyber is a critical tool for understanding and improving security postures. Attendees will receive the math, the tools, charts and schematics on how to measure their own security.
Winn Schwartau photo
Winn Schwartau
Chief Visionary Officer
Winn Schwartau LLC
Winn has lived Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD.
His new book, “Analogue Network Security” is a mathematical, time-based and probabilistic approach to justifiable security. His goal is to provide a first set of tools and methods to “fix security and the internet”, including fake news, spam, phishing, DDoS and more. It will twist your mind.
Distinguished Fellow: Ponemon Institute
Top-20 industry pioneers: SC Magazine.
Top 25 Most Influential: Security Magazine
Top 5 Security Thinkers: SC Magazine.
Power Thinker and one of the 50 most powerful people: Network World.
Top Rated (4.85) RSA Speaker

Author: Pearl Harbor Dot Com (Die Hard IV), 3 volumes of “Information Warfare,” “CyberShock”, “Internet and Computer Ethics for Kids”, “Time Based Security” (More on his web site.)
Founder: www.TheSecurityAwarenessCompany.Com
Founder: www.InfowarCon.Com
Executive Producer: “Hackers Are People Too”


Meet Our NCS 2019 Speakers

Jocquette Blue Photo Jocquette Blue Senior Cybersecurity Analyst H2L Solutions
Paige Boshell Photo Paige Boshell Managing Member Privacy Counsel LLC
Wayne Burke Photo Wayne Burke Vice President and Co-Founder Cyber2 Labs, LLC
Paul Coggin Photo Paul Coggin Cyber Security Research Scientist Financial Institution
Brian Contos Photo Brian Contos CISO Verodin
Randall Cottrell Photo Randall Cottrell Chief Executive Officer Bluejireh Incorporated
Joshua Crumbaugh Photo Joshua Crumbaugh Chief Hacker/Chief Operating Officer PeopleSec® LLC
Ben Curry Photo Ben Curry Chief Architect, Managing Partner Summit 7 Systems
Robert Decicco Photo Robert Decicco MD Digital Intelligence
Byron DeLoach Photo Byron DeLoach Director of Adaptive Services Cybriant
Bryan Dickens Photo Bryan Dickens Chief Operating Officer Cybint Solutions
Nicholas Downer Photo Nicholas Downer Systems Security Engineer/Instructor Millennium
Major Bradley Eames Photo Major Bradley Eames 47CTS OL-A Deputy Commander 47 Cyberspace Test Squadron
Toni Eberhart Photo Toni Eberhart Executive Director Urban Engine
Rita Edwards Photo Rita Edwards Featured Cyber Security Instructor CyberProtex
Scott Edwards Photo Scott Edwards President Summit 7 Systems
Shawn Edwards Photo Shawn Edwards Cyber Adversarial Engineer The MITRE Corporation
Irene Garcia-Goan Photo Irene Garcia-Goan Sr. Cybersecurity Analyst H2L Solutions
Travis Green Photo Travis Green
Miss SueAnne Griffith Photo Miss SueAnne Griffith Research Engineer University of Alabama Huntsville
Jonathan Hard Photo Jonathan Hard Chief Operating Office and President H2L Solutions
Mr. Christopher Hawkins Photo Mr. Christopher Hawkins Director of Business Development Scalable Network Technologies
Matt Henson Photo Matt Henson CEO Trade Collaboration Engine
Sean Hopkins Photo Sean Hopkins Red Team Security Engineer Millennium Corporation
Jason Hough Photo Jason Hough Director of Information Security Mission Multiplier
Dr. DJ Hovermale Photo Dr. DJ Hovermale Senior Cyber Operations Training Analyst, Principal SAIC
Chris Hutto Photo Chris Hutto Jr. Cybersecurity Engineer Mission Multiplier
Dr. Michaela Iorga Photo Dr. Michaela Iorga Senior Security Technical Lead NIST
Ray Kelly Photo Ray Kelly Security Architect Micro Focus
Ben McGee Photo Ben McGee CyberProtex Featured Cyber Security Instructor
Dr. Wesley McGrew Photo Dr. Wesley McGrew Director of Cyber Operations HORNE Cyber
Chris McLain Photo Chris McLain Information Technical Department Honda Manufacturing of Alabama, LLC
Jamie Miller Photo Jamie Miller CEO/President Mission Multiplier
Charlene Mowery CISM, PE Photo Charlene Mowery CISM, PE Vice President of Global Business and Marketing, Cybersecurity SME Ultra Electronics, 3eTI
Sonia Mundra Photo Sonia Mundra President Chenega Analytic Business Solutions, LLC (CABS)
Dr. Charline Nixon Photo Dr. Charline Nixon Dean EC-Council University
Dr. Ashley Podhradsky Photo Dr. Ashley Podhradsky Associate Dean and Associate Professor Dakota State University
Michael Portera Photo Michael Portera Red Team Security Engineer Millennium Corporation
Jonathan Risto Photo Jonathan Risto
Robert Rounsavall Photo Robert Rounsavall Co Founder Trapezoid, Inc.
Kell Rozman Photo Kell Rozman Security Software Engineering Senior Manager Toyota Motor North America
Antonio (Tony) Rucci Photo Antonio (Tony) Rucci Director, InfoSec & Threat Intelligence GRIDSMART Technologies
Brian Ruf CISSP, PMP Photo Brian Ruf CISSP, PMP FedRAMP PMO SME FedRAMP/GSA
Greg Schaffer Photo Greg Schaffer Principal vCISO Services, LLC
Dr. David Schippers Photo Dr. David Schippers Chair - Assistant Professor Walsh College
Jake Schneider Photo Jake Schneider Director of Cyber Technologies GaN Corporation
Winn Schwartau Photo Winn Schwartau Chief Visionary Officer Winn Schwartau LLC
Jeffrey Shapiro Photo Jeffrey Shapiro Senior Cyber Operations Training Analyst, Principal SAIC
Dr. Joshua Stroschein Photo Dr. Joshua Stroschein Training and Academic Outreach Open Information Security Foundation
Mr. Jeff Uphues Photo Mr. Jeff Uphues CEO DC BLOX
Trevor Vaughan Photo Trevor Vaughan Vice President Engineering Onyx Point, Inc.
Paul Wagner Photo Paul Wagner Assistant Professor of Practice University of Arizona
Dr. Brad Wardman Photo Dr. Brad Wardman Head of Threat Intelligence PayPal
Peter Weishaar Photo Peter Weishaar Enterprise Learning Specialist ITProTV
Mark Whigham Photo Mark Whigham Instructor Calhoun Community College
Wes Widner III Photo Wes Widner III Senior Cloud Engineer CrowdStrike
Shirley Zhao Photo Shirley Zhao Principal Program Manager, Product Security Governance Blackberry
Roy Zur Photo Roy Zur CEO and Founder Cybint Solutions and New York Center for Cyber Security

View AgendaView Speaker Listing


Attend NCS 2019 to meet and hear speakers like this!

Register Now