SlideShare a Scribd company logo
1 of 34
Download to read offline
Cyber Security
(yes, really)
(because we have to...)

13/10/13
Classification: unclassified

13/10/13
Challenge...

13/10/13
Clinton Ingrams
–

cfi@dmu.ac.uk

Cyber Security Centre
De Montfort University

(that's in Leicester)
Teaching PHP & pentesting
Undergrad & Postgrad

13/10/13
Threats
Agencies
Solutions

13/10/13
Cyber Security is...
●

Protecting people
–

and their information
●

13/10/13

on line
And the big problem is...
In humans we trust ...

13/10/13
Threats

13/10/13
Cyber Attacks
●

Estonia
– Multiple

DDoS
– 3 weeks, starting 27th April 2007
– First state-level cyber attack
● Now on NATO agenda

13/10/13
Cyber Attacks
●

Georgia
– Multiple

DDoS
– 7th August 2008
– In conjunction with military invasion
TTNET

Caucasus Cable

Caucasus Net

Delta Net
Transtelecom

TISCALI
Seabone

13/10/13

RETN
COGENT
Cyber Attacks
●

Syria
Israeli malware was (allegedly) installed in
Syrian Integrated Air Defence System
(IADS)
– 6th September 2007
– Disrupted Syrian nuclear research
–

www.defensetech.org/2007/11/26/israels-cyber-shot-at-syria/

13/10/13
Lost IPR
●

●

“the average business takes 300 days to
identify a data breach”
Small SMEs can lose ~£1M over 5-10 years

13/10/13
Other attack vectors

13/10/13
SMART...
●

Systems

●

Buildings
–
–

●

house
manufacturing

Cities
“arcologies”
Society
–

●

13/10/13
SCADA
●

Supervisory Control and Data Acquisition
Often programmed in software logic
blocks
Typically 30 year turnover in hardware/software
–

●

–
–

●

IET

13/10/13

Windows 95 still very common
Some equipment is 60 years old!
Malware
●

Stuxnet

●

Duku

●

Flame
–
–

13/10/13

now in the wild
have changed the face of modern warfare
People
●

Anonymous

●

Lulzsec

●

Julian Assange
–

●

Bradley (Chelsea) Manning

Edward Snowden
–
–

13/10/13

game changer
(insider threat)
Who's doing what???

13/10/13
HMG
●

Cabinet office

●

GCHQ

●

Centre for Protection of National
Infrastructure
–

13/10/13

CPNI
Police
●

National Crime Agency
–

National Cybercrime Unit

replaces
●

Serious Organised Crime Agency
–

13/10/13

SOCA
Cabinet Office
●

●

Create partnerships between businesses,
academics, HMG & international
£860m
–

over 5 years

–

From the NSCP
●

13/10/13

National Cyber Security Programme
National Cyber Security Strategy
Our vision is for the UK in 2015 to derive huge economic and social value from a
vibrant, resilient and secure cyberspace, where our actions, guided by our core
values of liberty, fairness, transparency and the rule of law, enhance prosperity,
national security and a strong society.
To achieve this vision by 2015 we want:
Objective 1:

Objective 2:

Objective 3:

The UK to tackle cyber
crime and be one of the
most secure places in the
world to do business in
cyberspace

The UK to be more
resilient to cyber attacks
and better able to protect
our interests in
cyberspace

The UK to have helped
shape an open, stable
and vibrant cyberspace
which the UK public can
use safely and that
supports open societies

Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to
underpin all our cyber security objectives
13/10/13
CPNI
●

Awareness raising
–

Physical vulnerabilities
●

–

Software vulnerabilities
●

13/10/13

Lots of “fireworks” demonstrations
???
What's to be done???

13/10/13
Coding
“Why is there never time or money to implement
proper application security before the launch date,
but always time and money to retro-fit security after
the first hack”
Anon

13/10/13
Testing
●

MoD – 4 levels of Vulnerability Assessment
–

Scanning

–

Toolkits
●

–

Penetration test
●

–

13/10/13

automated assessments
qualified & experienced expert

Physical test
TSI
●

Trustworthy Software Initiative
–

–

13/10/13

“Making software more secure, dependable and
reliable”
Partly as a documentation standards repository
Measuring
●

Security Analytics
–

13/10/13

are you safer/more secure now than you were
before?
Reading
Eg
Trustwave Global Security Report
– Checkpoint Security Report
– The Global Cyber Game report
–

●

http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

DefenseTech
– The Register
– etc
–

13/10/13
Cyber Security Vouchers
●

HMG

●

Department for Business, Innovation and Skils

●

Up to £5000 as a voucher
–

●

to spend improving the security of a client

http://news.bis.gov.uk/Press-Releases/Support-for-smallbusinesses-to-tackle-record-levels-of-cyber-attacks-68b5a.aspx

13/10/13
Training
●

Certified Application Security Tester
–

●

Certified Information Systems Security
Professional
–

●

CAST

CISSP

CESG Certified Professional
–

13/10/13

CCP
DMU
●

Cyber Security Centre

●

MSc Cyber Security (Deloitte)

●

MSc SCADA (EADS)

●

Free magazine
–

CyberTalk

–

multidisciplinary
http://softbox.co.uk/cybertalk
●

13/10/13
Questions??

13/10/13
●

http://www.dmu.ac.uk/research/research-faculties-andinstitutes/technology/cyber-security-centre/cyber-security-centre.aspx

●

https://www.gov.uk/government/publications/cyber-security-strategy

●

http://www.cpni.gov.uk/

●

http://www.ssgkc.com/strategic-initiatives/smart-city/

●

https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt

●

http://www.soca.gov.uk/

●

http://www.uk-tsi.org/

●

●

●

http://news.bis.gov.uk/Press-Releases/Support-for-small-businessesto-tackle-record-levels-of-cyber-attacks-68b5a.aspx
http://www.independent.co.uk/news/uk/home-news/more-than-amillion-british-youngsters-being-bullied-online-every-day8852097.html
http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

13/10/13

More Related Content

Viewers also liked

Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentationrclark004
 

Viewers also liked (6)

Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
 

Similar to Phpnw 2013 cyber-security

Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamananSyaiful Ahdan
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal SangeethaSangeetha M Kannuchamy
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismNihal Jani
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 

Similar to Phpnw 2013 cyber-security (20)

Take Down
Take DownTake Down
Take Down
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamanan
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal Sangeetha
 
The red book
The red book  The red book
The red book
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Phpnw 2013 cyber-security