{"guid":"3aae5c0a-9c9b-483a-8c09-b4402d749a82","title":"The Case for Scale in Cyber Security","subtitle":"Security Track Keynote","slug":"36c3-11220-the_case_for_scale_in_cyber_security","link":"https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/11220.html","description":"The impact of scale in our field has been enormous and it has transformed the tools, the jobs and the face of the Infosec community. In this talk we discuss some of the ways in which defense has benefitted from scale, how the industry might be transitioning to a new phase of its growth and how the community will have to evolve to stay relevant.","original_language":"eng","persons":["Vincenzo Iozzo"],"tags":["36c3","11220","2019","CCC","Main"],"view_count":3298,"promoted":false,"date":"2019-12-27T11:30:00.000+01:00","release_date":"2019-12-28T01:00:00.000+01:00","updated_at":"2026-03-21T00:30:06.028+01:00","length":1938,"duration":1938,"thumb_url":"https://static.media.ccc.de/media/congress/2019/11220-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2019/11220-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2019/11220-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2019/11220-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/36c3-11220-the_case_for_scale_in_cyber_security","url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_title":"36C3: Resource Exhaustion","conference_url":"https://api.media.ccc.de/public/conferences/36c3","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"fin","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security.fi.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2025-05-26T00:37:16.635+02:00","recording_url":"https://cdn.media.ccc.de/congress/2019/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security.fi.srt","url":"https://api.media.ccc.de/public/recordings/87617","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":null,"length":null,"mime_type":"text/vtt","language":"fra","filename":"3aae5c0a-9c9b-483a-8c09-b4402d749a82-fra.vtt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T20:03:47.328+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/3aae5c0a-9c9b-483a-8c09-b4402d749a82-fra.vtt","url":"https://api.media.ccc.de/public/recordings/48032","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:47:40.800+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security.en.srt","url":"https://api.media.ccc.de/public/recordings/45426","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":344,"length":1938,"mime_type":"video/webm","language":"eng-deu-fra","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T15:00:48.418+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-hd/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/42537","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":145,"length":1938,"mime_type":"video/webm","language":"eng-deu-fra","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-12-28T15:00:04.418+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-sd/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/42536","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":130,"length":1938,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-12-28T14:46:37.209+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-sd/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/42507","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":29,"length":1920,"mime_type":"audio/mpeg","language":"eng","filename":"36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-12-28T14:45:57.848+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/mp3/36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/42506","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":128,"length":1938,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T14:45:49.662+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/slides-h264-hd/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/42505","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":18,"length":1920,"mime_type":"audio/opus","language":"eng","filename":"36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-12-28T14:45:18.666+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/opus/36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security_opus.opus","url":"https://api.media.ccc.de/public/recordings/42504","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":290,"length":1938,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T12:48:56.686+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-11220-eng-deu-fra-The_Case_for_Scale_in_Cyber_Security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/42480","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":191,"length":1938,"mime_type":"video/mp4","language":"fra","filename":"36c3-11220-fra-The_Case_for_Scale_in_Cyber_Security.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T12:48:30.067+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-11220-fra-The_Case_for_Scale_in_Cyber_Security.mp4","url":"https://api.media.ccc.de/public/recordings/42479","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":191,"length":1938,"mime_type":"video/mp4","language":"deu","filename":"36c3-11220-deu-The_Case_for_Scale_in_Cyber_Security.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T12:48:13.966+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-11220-deu-The_Case_for_Scale_in_Cyber_Security.mp4","url":"https://api.media.ccc.de/public/recordings/42478","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":191,"length":1938,"mime_type":"video/mp4","language":"eng","filename":"36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-28T12:47:53.485+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-11220-eng-The_Case_for_Scale_in_Cyber_Security.mp4","url":"https://api.media.ccc.de/public/recordings/42477","event_url":"https://api.media.ccc.de/public/events/3aae5c0a-9c9b-483a-8c09-b4402d749a82","conference_url":"https://api.media.ccc.de/public/conferences/36c3"}]}