SlideShare a Scribd company logo
A Place to
Hang Our Hats
Security Community and Culture
@NotDomenic
Full Disclosure
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
The Alpha and the Omega
Kevin Mitnick was the
first and only hacker,
lead Anon to glory, took
down the FBI, made Tor
untraceable, and hacked
the alien mothership on
the 4th of July.
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
while author != tech_literate:
if narrative < truth and news_day == slow:
story = facts.sensationalized() + scare_factor
print headline.cyber() + story
else:
print repackaged_content.rand()
Let’s Make an Algorithm!!
(Sidebar)
Terms to avoid:
● “Cyber”.*
● Console Cowboys
● Authentification
● Cracker (confusion)
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
Out of the Fire, Into the Flame War
● LOD & MOD
● DOJ & over-curious young people
● Lulzsec & Anonymous
● Groups like w00w00, l0pht, [insert group
you’re outraged I didn’t include]
Guiding Question
Are we seeing significant changes and declines
in hacker culture and the size of the hacking
community?
Maybe?
Growth Led to Decline
Proposal: Growth in the security community
has changed its values and makeup.
● Corporate Growth
● Law Enforcement Growth
● Growth in Field Population
Growth
Growth
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
Growth: FBI
● FBI Alone saw >350%
growth in Intelligence
Officers (support, non-
special agents) in 90’s
○ 1992: 224
○ 2000: 1027
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
Growth: NSA
● 11,000+ new employees
between 2001-2013
● Fort Meade Facility >
Pentagon
● budget_nsa *= 2
● Private contracting companies
○ Pre-2001: ~150 companies
○ 2010: ~ 500 companies
Growth
Growth
Growth: Punishment
● Congress and
Lobbies push:
○ CFAA
○ USA PATRIOT Act
○ DMCA
Growth: Punishment
Growth of InfoSec: Decline of
Goups?
● With a growth in both backing of and leaning
on security infrastructure, disclosure has
become more frequent
● Wouldn’t we expect to see more hacking
collectives?
Growth: C****-Crime
● Organized crime, sometimes even state-
sponsored, have taken on some l33t haxors
as assets.
● Dark Net, Botnets, Anonymity Tools
disincentivize strong open group
collaboration
● Major busts: Just one leak
Growth: Responsible Disclosure
● Old Crackers, Sneakers now have avenues
to pursue legitimate “cracking”, “sneaking”
○ More profitable ones too: Biggest bug bounties now
worth 3.877+ ISS’s
● Growing up, settling down, torrenting hacker
children
● Less teenage angst
Enter Enterprise
● Students &
youngins’ pursuing
entrepreneurial and
app “hacks”
Omnipresent: Troll & Co
Omnipresent: Troll & Co
Thank You’s
● Zach Lanier
● Chris Czub
● Vikas Kumar
● Mark Stanislav
● Jon Oberheide
● Tyler Shields
● Your patience for n00bs
Q & (Hopefully) A

More Related Content

PPTX
A visit to the darknet
Michelle Devanny
 
PPTX
Darknet
KamalPreet Saluja
 
PPTX
Deep and Dark web
Nihal Ahmed
 
PPTX
Deep web
Programar Animesh
 
PPTX
Deepweb darknet mansukhani
Jack Mansukhani
 
PPTX
Deep web and Dark web
Parvez Hossain
 
PPTX
The Deep Web
Melissa Pereira
 
PDF
Unmasking miscreants
Brandon Levene
 
A visit to the darknet
Michelle Devanny
 
Deep and Dark web
Nihal Ahmed
 
Deepweb darknet mansukhani
Jack Mansukhani
 
Deep web and Dark web
Parvez Hossain
 
The Deep Web
Melissa Pereira
 
Unmasking miscreants
Brandon Levene
 

What's hot (20)

PPTX
Digital citizenship number 6
Siegmeyer
 
PPTX
The Deep Web
Melody Chiaoco
 
PPTX
Deep web
Manoj Prasad
 
PPTX
The dark web
hellboytonmoy
 
PPTX
The dark web
hellboytonmoy
 
PPTX
Fourth Amendment as a Service - Workshop - 2-21-17
FourthAsAService
 
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
 
PPTX
Internet Privacy: Time to Rethink?
Jonathan Reichental
 
PDF
Deep Dark Web - How to get inside?
Anshu Prateek
 
PDF
Wp below the_surface
Medina Núñez
 
PPTX
The Dark Web
Jan Siy
 
PPTX
Deep web & Darknet
Niloy Sikder
 
PPTX
Dark and Deep web
Khaled Sany
 
PPTX
Deep web
Abu Kaisar
 
PDF
The Darknet Emerges
Andrew Delamarter
 
PPTX
Darknet
Matthew Kwong
 
PPSX
Famous hackers group
Ashokkumar Gnanasekar
 
PPTX
Dark Web and Privacy
Brian Pichman
 
PPT
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
PPTX
Megaupload pp
chrisrichhh
 
Digital citizenship number 6
Siegmeyer
 
The Deep Web
Melody Chiaoco
 
Deep web
Manoj Prasad
 
The dark web
hellboytonmoy
 
The dark web
hellboytonmoy
 
Fourth Amendment as a Service - Workshop - 2-21-17
FourthAsAService
 
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
 
Internet Privacy: Time to Rethink?
Jonathan Reichental
 
Deep Dark Web - How to get inside?
Anshu Prateek
 
Wp below the_surface
Medina Núñez
 
The Dark Web
Jan Siy
 
Deep web & Darknet
Niloy Sikder
 
Dark and Deep web
Khaled Sany
 
Deep web
Abu Kaisar
 
The Darknet Emerges
Andrew Delamarter
 
Darknet
Matthew Kwong
 
Famous hackers group
Ashokkumar Gnanasekar
 
Dark Web and Privacy
Brian Pichman
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
Megaupload pp
chrisrichhh
 
Ad

Viewers also liked (16)

PDF
Making Web Development "Secure By Default"
Duo Security
 
PDF
Probing Mobile Operator Networks - Collin Mulliner
Duo Security
 
PDF
No Apology Required: Deconstructing BB10
Duo Security
 
PDF
The Internet of Things: We've Got to Chat
Duo Security
 
PDF
The Real Deal of Android Device Security: The Third Party
Duo Security
 
PDF
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Duo Security
 
ODP
Portfolio Stephanie Spackman
Stephanie Spackman
 
PDF
Arte, Liturgia y Teología
Walter Morzán
 
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Duo Security
 
PDF
Security Fact & Fiction: Three Lessons from the Headlines
Duo Security
 
PDF
Security For The People: End-User Authentication Security on the Internet by ...
Duo Security
 
PPTX
Pregúntale a alicia
maona
 
PPTX
Cardiff presentation 11th august 2014 uploaded
Andrea Wheeler
 
PDF
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Duo Security
 
PDF
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Duo Security
 
PDF
Curriculum Vitae - Aslam
aslammcse
 
Making Web Development "Secure By Default"
Duo Security
 
Probing Mobile Operator Networks - Collin Mulliner
Duo Security
 
No Apology Required: Deconstructing BB10
Duo Security
 
The Internet of Things: We've Got to Chat
Duo Security
 
The Real Deal of Android Device Security: The Third Party
Duo Security
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Duo Security
 
Portfolio Stephanie Spackman
Stephanie Spackman
 
Arte, Liturgia y Teología
Walter Morzán
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Duo Security
 
Security Fact & Fiction: Three Lessons from the Headlines
Duo Security
 
Security For The People: End-User Authentication Security on the Internet by ...
Duo Security
 
Pregúntale a alicia
maona
 
Cardiff presentation 11th august 2014 uploaded
Andrea Wheeler
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Duo Security
 
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Duo Security
 
Curriculum Vitae - Aslam
aslammcse
 
Ad

Similar to A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo (20)

PPTX
I hack you hack we all hack
KaraMichelleHarkins
 
PPT
hacking
mayank1293
 
PDF
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
PPT
C|EH Introduction
sunnysmith
 
PPTX
Evolution of Hacking- Ronit Chakraborty .pptx
null - The Open Security Community
 
PPTX
Powerpoint
Marcelomazzocato
 
PPTX
Corp Web Risks and Concerns
PINT Inc
 
PPT
Med122 hackers lecture
Rob Jewitt
 
DOCX
Report on hacking crime and workable solution
Shohag Prodhan
 
PDF
Hacking The Future Privacy Identity And Anonymity On The Web Cole Stryker
aacedtcv4898
 
PPTX
Cyber crime &_info_security
Er Mahendra Yadav
 
PPT
Hacking And Its Prevention
Dinesh O Bareja
 
PPTX
Hacking
Virus
 
PPT
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
PPTX
Ethical hacking : Beginner to advanced
Kavin K
 
PPT
Ethical hacking
A Raheem Ansari
 
PPTX
Ethical Hacking
Muzaffar Ahmad
 
PDF
article cybersecurity must B2B metaverse
Mext Metaverse
 
PDF
Report on Hacking
Sharique Masood
 
PDF
The Secret Of Hacking Trial Pages
leoimpact
 
I hack you hack we all hack
KaraMichelleHarkins
 
hacking
mayank1293
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
C|EH Introduction
sunnysmith
 
Evolution of Hacking- Ronit Chakraborty .pptx
null - The Open Security Community
 
Powerpoint
Marcelomazzocato
 
Corp Web Risks and Concerns
PINT Inc
 
Med122 hackers lecture
Rob Jewitt
 
Report on hacking crime and workable solution
Shohag Prodhan
 
Hacking The Future Privacy Identity And Anonymity On The Web Cole Stryker
aacedtcv4898
 
Cyber crime &_info_security
Er Mahendra Yadav
 
Hacking And Its Prevention
Dinesh O Bareja
 
Hacking
Virus
 
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ethical hacking : Beginner to advanced
Kavin K
 
Ethical hacking
A Raheem Ansari
 
Ethical Hacking
Muzaffar Ahmad
 
article cybersecurity must B2B metaverse
Mext Metaverse
 
Report on Hacking
Sharique Masood
 
The Secret Of Hacking Trial Pages
leoimpact
 

Recently uploaded (20)

PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 

A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo

  • 1. A Place to Hang Our Hats Security Community and Culture @NotDomenic
  • 6. The Alpha and the Omega Kevin Mitnick was the first and only hacker, lead Anon to glory, took down the FBI, made Tor untraceable, and hacked the alien mothership on the 4th of July.
  • 8. while author != tech_literate: if narrative < truth and news_day == slow: story = facts.sensationalized() + scare_factor print headline.cyber() + story else: print repackaged_content.rand() Let’s Make an Algorithm!!
  • 9. (Sidebar) Terms to avoid: ● “Cyber”.* ● Console Cowboys ● Authentification ● Cracker (confusion)
  • 11. Out of the Fire, Into the Flame War ● LOD & MOD ● DOJ & over-curious young people ● Lulzsec & Anonymous ● Groups like w00w00, l0pht, [insert group you’re outraged I didn’t include]
  • 12. Guiding Question Are we seeing significant changes and declines in hacker culture and the size of the hacking community? Maybe?
  • 13. Growth Led to Decline Proposal: Growth in the security community has changed its values and makeup. ● Corporate Growth ● Law Enforcement Growth ● Growth in Field Population
  • 17. Growth: FBI ● FBI Alone saw >350% growth in Intelligence Officers (support, non- special agents) in 90’s ○ 1992: 224 ○ 2000: 1027
  • 19. Growth: NSA ● 11,000+ new employees between 2001-2013 ● Fort Meade Facility > Pentagon ● budget_nsa *= 2 ● Private contracting companies ○ Pre-2001: ~150 companies ○ 2010: ~ 500 companies
  • 22. Growth: Punishment ● Congress and Lobbies push: ○ CFAA ○ USA PATRIOT Act ○ DMCA
  • 24. Growth of InfoSec: Decline of Goups? ● With a growth in both backing of and leaning on security infrastructure, disclosure has become more frequent ● Wouldn’t we expect to see more hacking collectives?
  • 25. Growth: C****-Crime ● Organized crime, sometimes even state- sponsored, have taken on some l33t haxors as assets. ● Dark Net, Botnets, Anonymity Tools disincentivize strong open group collaboration ● Major busts: Just one leak
  • 26. Growth: Responsible Disclosure ● Old Crackers, Sneakers now have avenues to pursue legitimate “cracking”, “sneaking” ○ More profitable ones too: Biggest bug bounties now worth 3.877+ ISS’s ● Growing up, settling down, torrenting hacker children ● Less teenage angst
  • 27. Enter Enterprise ● Students & youngins’ pursuing entrepreneurial and app “hacks”
  • 30. Thank You’s ● Zach Lanier ● Chris Czub ● Vikas Kumar ● Mark Stanislav ● Jon Oberheide ● Tyler Shields ● Your patience for n00bs