<div>So I&#39;m talking at RSA - which I&#39;ve never been to. From what I can tell RSA is less about the talks than the furious &quot;back to back&quot; meetings people set up during the conference. I&#39;ve never participated in said debauchery but I am adding some content to the talk, and I think I hint at it in the below MPEG-Layer-3 audio file.</div>
<div><br></div>Podcast: <a href="http://rsa.edgeboss.net/download/rsa/rsaconference/2012/us/podcasts/rsac_02-01-12-ht1-402-edit.mp3">http://rsa.edgeboss.net/download/rsa/rsaconference/2012/us/podcasts/rsac_02-01-12-ht1-402-edit.mp3</a><div>
<br></div><div><br></div><div>-dave</div><div><br><div><br></div><div><br><table border="0" cellspacing="0" cellpadding="3" style="outline-style:none;outline-width:initial;outline-color:initial;border-collapse:collapse;font-size:12px;margin-bottom:1em;color:rgb(59,59,59);font-family:Arial,Helvetica,Tahoma,sans-serif;line-height:14px;text-align:left;background-color:rgb(255,255,255)">
<tbody style="outline-style:none;outline-width:initial;outline-color:initial"><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Session Code:</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
HT1-402</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td colspan="3" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Session Title:</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
The Three Myths of Cyberwar</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Speaker:</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
Dave Aitel <small style="outline-style:none;outline-width:initial;outline-color:initial;font-size:10px">Chief Technology Officer</small><br style="outline-style:none;outline-width:initial;outline-color:initial"><span class="note" style="outline-style:none;outline-width:initial;outline-color:initial;font-size:10px;color:rgb(153,153,153)">Immunity Inc</span><br style="outline-style:none;outline-width:initial;outline-color:initial">
</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Scheduled Date(s)/Time(s):</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
Friday, March 02 10:10 a.m.<br style="outline-style:none;outline-width:initial;outline-color:initial">Room 102</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Session Length:</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
50 minutes</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Session Abstract:</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
Many sources for cyber strategy, and the policies that affect those strategies, focus on three facets of the cyber domain: cyber attacks are asymmetric, cyber attacks are unattributable and cyber attacks are non-kinetic. This talk will explain why none of these facets are true.</td>
</tr><tr style="outline-style:none;outline-width:initial;outline-color:initial"><td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Prerequisite knowledge</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
Generally it helps if you have been keeping up with news in the cyber war area. This session will be using terms such as exploit, vulnerabilities and buffer overflow that should be familiar.</td></tr><tr style="outline-style:none;outline-width:initial;outline-color:initial">
<td class="formPromptTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:170px;text-align:right;font-weight:bold">
Session learning objectives</td><td class="formReqTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:7px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top;width:5px;color:rgb(204,51,51)">
 </td><td class="formElementTd" style="outline-style:none;outline-width:initial;outline-color:initial;font-family:Arial,&#39;MS Sans Serif&#39;,Helvetica;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;vertical-align:top">
<ul style="outline-style:none;outline-width:initial;outline-color:initial;margin-top:0.5em;margin-right:0.5em;margin-bottom:0.5em;margin-left:2em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px"><li style="outline-style:none;outline-width:initial;outline-color:initial;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;list-style-type:disc;list-style-position:outside">
Understand what sort of metrics make sense with cyber war (aka, how does one truly think about cyber war without relying on gut feelings)</li><br style="outline-style:none;outline-width:initial;outline-color:initial"><li style="outline-style:none;outline-width:initial;outline-color:initial;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;list-style-type:disc;list-style-position:outside">
Develop a framework to judge policy both at the high level and the corporate enterprise level, when it comes to facing well funded cyber war threats</li></ul><div><br></div><div><br></div></td></tr></tbody></table></div></div>