Arron Harrell, Cyber Security Engineer, Verodin
From 19th century mechanical computers to telephones, radios, digital computers, and the Internet, acts of sabotage, fraud, theft, and other nefarious undertakings have been conducted with low risk, minimal hurdles, and high reward. In some cases, attackers even receive safe harbor from prosecution. Bad actors ranging from insiders and hacktivists to cybercriminals and nation-states are motivated by money, politics, revenge, and ideology. As an industry we respond with more buzzwords, shiny boxes, and bigger budgets. Unfortunately, that response is no longer effective and what kept us secure has stopped working. This presentation will explore an abridged history of hackers, hooligans, and heists. It will also examine new ways of approaching cybersecurity to mitigate nefarious acts by focusing on actual security effectiveness instead of the latest APT, 0-day, and regulatory mandate.
We will translate the “who, how, and why” of cyberattacks. We will identify multiple “old school” and modern-day threat vectors and organize attacks by motives like sabotage and espionage. Each threat actor type will be explored in detail with real-life use cases and personal accountants. The examples used will illustrate the diversity in threats, methods, motivations, and organizational responses.