I am the Cavalry, made up of researchers and hackers, has taken on the role of identifying security weaknesses in all areas to do with public security and human lives. Because in theory, all connected objects can be controlled remotely: a car, a refrigerator, a surveillance camera, a toaster... For Elazari, “we must become the CTOs of our own bodies, cars, and even our homes”. Because even if we don’t want to, we will inexorably have more and more connected objects in our homes.
Such actions by these “friendly hackers” served as an electroshock for companies and organizations all over the world. As Barnaby Jack so rightly said, “You have to demonstrate a threat to spark a solution”. Thus at the last hackers’ Def Con, Tesla recompensed the security experts who had exposed possible security breaches in their cars. A yacht company also called on hackers to attempt to reroute their boats - unsurprisingly the hackers managed to modify the signal sent by the GPS and alter the course by a few degrees.
The Bug Bounty collaboration program between hackers and companies was set up a few years ago and has attracted adepts from the web majors (Mozilla, Facebook, Etsy, Mastercard...), all the way to government security services. The idea is to place a marker on your site indicating your participation in the program, and to recompense hackers who manage to highlight security weaknesses in their information systems. The Pentagon launched its own program in 2016, “Hack the Pentagon”, and received its first valid vulnerability report in under 15 minutes. In the end, over 200 vulnerabilities were identified in the space of a few weeks.
Elazari concludes her conference with some words of advice for companies:
Cybersecurity is there to protect our way of life. For that, it is the talent hackers have that we all need. “Whether they’re good or bad, they force us to react, to evolve and become better.”