Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
This is the interactive agenda for Suits and Spooks Washington D.C. 2015. This a draft a agenda and subject to change. Online registration is available here.
View analytic
Wednesday, February 4 • 3:20pm - 3:45pm
Culture and Cyber Behaviors

Sign up or log in to save this to your schedule and see who's attending!

Ghandi said, “Your values become your destiny.” These values can be used to categories users, thus putting the human in cyber behavior?

This talk examines what our value systems say about how we behave in cyberspace. Is it possible that we have certain default settings that reveal information about our identities? Our cultural values, act as default settings and this talk discusses the linkage between culture and cyber behaviors.

Our adversaries also have value systems, and accompanying behaviors. Because of these value systems, cyber warfare, espionage, and international actions are exceptionally well suited for connecting the human to their cyber behaviors. Traditional (kinetic) war behaviors vary by country, why would cyber be different?

This talk discusses the statistical relationship found between culture and cyber behaviors. The speakers will discuss the framework that they use for characterizing nation-state cyber actors and the statistical methods used to evaluate the relationship between culture and cyber behaviors. Finally, the speakers will also discuss the implications of their findings to date along with other possible applications.


Speakers
avatar for Dr. Char Sample

Dr. Char Sample

Research Scientist, CERT
Dr. Char Sample is an academically and professionally experienced cyber security professional with over 20 years experience in network security and software engineering. She is currently a research scientist at CERT.  Internet security experiences include expertise with firewalls, IDS, IPS, Anomaly Detection, DNS, DNSSEC, Mail, routing, authentication, encryption, secure network architectures, cloud computing (IaaS and PaaS) and Unix... Read More →


Wednesday February 4, 2015 3:20pm - 3:45pm
Main Track