BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-cymru-2023-2022//speaker//CN8NKN
BEGIN:VEVENT
UID:pretalx-bsides-cymru-2023-2022-BZQBXJ@pretalx.com
DTSTART:20230211T095000Z
DTEND:20230211T103500Z
DESCRIPTION:Thought experiments are used in many disciplines - from theoret
 ical physics and biology to linguistics and law - to question assumptions 
 and generate new theories. Perhaps most prominently\, they are a critical 
 tool in philosophy\, where their usage goes back thousands of years to Soc
 rates and Plato. The insights and knowledge that rigorous\, carefully cons
 idered thought experiments provide have completely revolutionized thinking
  in various fields. And yet\, in cyber security\, we haven’t made much u
 se of them at all\, and certainly not in any organized or formalized manne
 r. This talk is an attempt to begin changing that.\n\nIn this session\, I
 ’ll provide a primer on thought experiments\, covering their definitions
 \, types\, features\, construction\, usage\, and outputs. I’ll examine s
 ome examples\, discuss the drawbacks\, and explore some unconventional for
 ms which use different formats and ways of thinking.\n\nI’ll then move o
 n to argue a case for using thought experiments more widely in cyber secur
 ity. I’ll start by focusing on how thought experiments differ from simil
 ar activities in security – such as tabletop exercises and ‘thinking l
 ike an attacker’ – and suggest several related areas in which thought 
 experiments have proven useful previously\, such as AI and cryptography\, 
 with examples.\n\nNext\, I’ll outline why we need more thought experimen
 ts in cyber security\, identifying several areas in which they could be us
 ed to question common assumptions and theories\, and I’ll present some t
 hought experiments I’ve created in these areas\, which I’ll invite att
 endees to use and build on as a starting point for further discussion and 
 exploration.\n\nI’ll then share a guide for creating thought experiments
 \, as a first step towards encouraging their wider design and use in the f
 ield of security\, and finish by calling for collaboration and cooperation
  to continue this.
DTSTAMP:20260415T224938Z
LOCATION:Track 1- Dragon Suite
SUMMARY:Let that think in: Thought experiments and their application to cyb
 er security - Matt Wixey
URL:https://pretalx.com/bsides-cymru-2023-2022/talk/BZQBXJ/
END:VEVENT
END:VCALENDAR
