Cyber Trends, Policy, Computers and More

Submitted by: Daryl Haegley, Director, Mission Assurance & Cyber Deterrence at Dod


Cyber Trends and Policy Issues

· Rob Joyce – DEF CON 26 - “NSA Talks Cybersecurity”

· Thomas Dullien – CyCon 2018 – “Security, Moore’s law, and the anomaly of cheap complexity”

· Matt Tait – INFILTRATE 2018 – “Updating how we think about security”

· Nate Fick – INFILTRATE 2016 – “Learning to Win”

· Alex Stamos – DataEDGE 2019 – “The Platform Challenge: Balancing Safety, Privacy and Freedom”

· Thomas Dullien – Black Hat Asia 2017 – “Why We Are Not Building A Defensible Internet”

Computers and Code 101

· CS50, “Lecture 0 – Computational Thinking”

· CS50, “Lecture 0 – Arrays”

· CS50, “Lecture 0 – Memory”

· Computerphile, “Inside the CPU”

· Computerphile, “Turing Complete”

· Computerphile – “Virtual Machines Power the Cloud”

Internet 101

· Jessica McKellar – RuPy 13 – “How the Internet Works”

· Andrew Blum – TED – “What is the Internet, really?”

· Martin Hannigan – NANOG 37 – “Analysis of DNS Root Server Location”

· Geoff Huston – ENOG 13 – The Death of Transit and Beyond

· Craig Labovitz – NANOG 76 – “Internet Traffic 2009-2019

Offensive Cyber 101

· Computerphile – “Running an SQL Injection Attack”

· Computerphile – “Buffer Overflow Attack”

· Computerphile – “Cracking Websites with Cross-Site Scripting”

· Haroon Meer – Black Hat USA 2010 - “Memory Corruption: The (almost) Complete History”

Offensive Cyber 201

· Thomas Dullien – RuhrSec 2018 – “Weird Machines, Exploitability, and provable non-exploitability: Understanding the nature of ‘exploits’”

· dotsarecool – “Super Mario World Credits Warp Explained”

· Mikko Hypponen – DEF CON 19 – “The History and Evolution of Computer Viruses”

· Alexei Bulazel – ShmooCon 2018 – “Catch Me If You Can: A Decade of Evasive Malware Attack and Defense”

Defensive Cyber 201

· Ivan Dwyer – Google Security for Everyone Else

· David Weston – Black Hat USA 2018 – “ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?”