Doug Britton Presents "Should We Be Paranoid: Is Your Software Your Enemy?" at the Symposium on Counterfeit Parts and Materials

Bio: Created and developed a game-changing cyber security business, nurturing security technologies from chalkboard, to contract award, to field deployment. Established track record designing, building and selling increasingly sophisticated and revolutionary products to both the private and public sector. Strong technical background generates high-impact capabilities, restructuring previously held assumptions, limits and complexity drivers, while minimizing required investment. US Army Human Intelligence experience results in strong leadership skills, quick assessment of new operating environments, and understanding the needs of mission customers, increasing the impact of targeted R&D activities.

Abstract: As Britton's First Law of Autocomputerification tells us, attackers utilizing cybersecurity vulnerabilities in vehicles and physical systems to gain economic advantage is as certain as apples falling from trees. Since the beginning of recorded human history, attackers, hijackers, thieves have used every method at their disposal to gain economic advantage, while at below market cost. Cyber weaknesses present opportunities for the same attackers to achieve the same outcomes, with less risk of getting caught. While we haven't cracked the code of apple-anti-gravity, we can catastrophically disrupt the cost/benefit analysis for attackers contemplating software-exploitation methods to achieve economic or political objectives. 


Top