Governance & Risk Management , Insider Threat , Next-Generation Technologies & Secure Development

Evolving Cybersecurity: Embrace an Infinite Defense Strategy

Resecurity COO Shawn Loveland Challenges Norms With Constantly Evolving Response
Shawn Loveland, COO, Resecurity

As the threat landscape continues to evolve, defenders need to shift their focus from individual wins to sustained proactive defenses. Resecurity COO Shawn Loveland proposes embracing a strategy of understanding and fighting adversaries in a constantly changing space - with no beginning and no end.

See Also: Network Threat Trends Research Report

"A finite game has a beginning, middle and end," Loveland said. "It's like building a rocket ship to reach the moon. Once the goal is achieved, the game concludes." He contrasted this with the infinite game model in which the rules remain consistent and the objective shifts from winning to maintaining a proactive stance.

Keeping tabs on the dark web and understanding how cybercriminals gauge their success and the friction they encounter helps with this paradigm shift Loveland proposes. This insight empowers defenders to create new metrics to measure the obstacles placed in the way of cybercriminals.

In this interview with Information Security Media Group at Black Hat USA 2023, Loveland also discussed:

  • Recognizing human motivations and resources in cybercrime;
  • Developing effective defenses by understanding motives and negating them;
  • Resecurity's role in helping companies understand external threats through dark web research.

Loveland has over 35 years of experience in technology and cybersecurity both in large and small companies. He has originated 15 U.S. patents as well as many international patents in diverse areas such as computer security and telephony.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.