Black Hat USA 2025: When Success Fuels Future Cyber Risk
Black Hat USA 2025 opened with sharp reflections on how culture, geopolitics, and measurement shape modern cybersecurity—and how today’s quiet success can seed tomorrow’s risk.
Jeff Moss: Technology is now political
- Moss argued that technology has become political, with sanctions and bans limiting cooperation, suppressing revenue, and slowing innovation.
- While some limits may be justified, the framing matters: politics now shapes the pace and direction of tech progress.
Culture vs. technology: Who adapts to whom?
- Moss posed a crucial question for every business: do companies adapt to technology, or should technology be adapted to company culture?
- Cost-cutting often hits customer service first—outsourcing and now generative AI as the first line of contact—creating barriers to human help.
- Real-world misfire: an AI hotel chatbot gave wrong gym hours and couldn’t provide the location; a human clarified it’s open 24/7 on the 3rd floor. Poor AI execution undermined trust in the brand.
- Takeaway: Let culture and customer experience drive how (and where) AI is deployed. Keep human-in-the-loop for accuracy and trust.
Mikko Hypponen: Rethinking blame and measuring success
- On phishing: Hypponen challenged the reflex to blame users who click. If a malicious link reaches a user, that’s a failure of security controls upstream—not just end-user training.
- On success: In cybersecurity, success looks like “nothing happens.” That paradox makes it hard to prove value and can tempt leaders to cut budgets when incidents are low.
- The risk cycle: If success drives budget cuts, defenses weaken, attacks succeed, premiums and disruption rise, and frantic reinvestment follows—creating a costly loop.
- Imperative: Sustain investment based on risk and performance metrics, not the absence of headlines. Communicate silent wins through clear reporting.
Closing note
- After three decades in cybersecurity, Hypponen announced he’s leaving the industry to join a defense contractor.
Key takeaways
- Technology and geopolitics are intertwined—expect collaboration and innovation to feel the impact.
- Design technology around company culture and customer trust; avoid AI that degrades service.
- Shift from user-blame to control-blame for phishing; strengthen prevention before messages reach inboxes.
- Treat quiet periods as proof your strategy works—not a reason to cut security budgets.
Source: WeLiveSecurity
Back…