SlideShare a Scribd company logo
1 of 18
SAFELY ENABLING BUSINESS www.securelink.net
2 0 . 0 0 0 a t t a c k s b y p a s s i n g o u r d e f e n s e s
a n d w h y s e c u r e c o d i n g i s n ’ t t h e a n s w e r
E w a r d D r i e h u i s • @ e 3 h u i s • w w w . s e c u r e l i n k . n e t
SAFELY ENABLING BUSINESS www.securelink.net
THIS STORY IS BASED ON TRUE DATA
• 24 years in tech / software & security
• 700+ SecureLinkers
• 2100 customers in 2018
• 5 Cyber Defense Centers
• Over 10 trillion signals
2019-05-192
RESEARCH
SAFELY ENABLING BUSINESS www.securelink.net32019-05-19
Once upon a time….
SAFELY ENABLING BUSINESS www.securelink.net42019-05-19
2006 - 2010
2013
2017
2019
SAFELY ENABLING BUSINESS www.securelink.net19/05/2019
A LOOK AT OUR NUMBERS
5
• Signal to incident process
• Layered detection: malware wins
• Many “strange events”
SAFELY ENABLING BUSINESS www.securelink.net19/05/2019
• Cybercriminals & spies using same
methods: social engineering
• Automated scanning: software &
versions, password stuffing
LET’S TALK INITIAL ATTACK VECTORS
6
Safely Enabling Business www.securelink.de19/05/2019
BIGGER IS MORE SECURE
7
ATTACK FACTOR
per 100/employees
9.1 1.5 1.3
SAFELY ENABLING BUSINESS www.securelink.net19/05/2019
• Ransomware is hard work
• Cryptojacking super easy
• Cryptojacking surpassed
ransomware
• … For a while. It’s not as big as
some say it is.
THE YEAR CRYPTOJACKING TOOK OVER?
8
jan feb mrt apr mei jun jul aug sep okt nov dec
CryptoJacking Ransomware
SAFELY ENABLING BUSINESS www.securelink.net9
SAFELY ENABLING BUSINESS www.securelink.net
OPPORTUNITY
FOR
VETERAN
CRIMINALS
2019-05-1910
Quietly enter network
• Look for value
• Steal or extort value
Plan B
• Destroy online back-ups
• Ransom network
• Extort enterprise ransom
SAFELY ENABLING BUSINESS www.securelink.net
THE POWER
OF BIG
NUMBERS
11
BIG DATA
RETAIL FRAUD
CREDIT CARD THEFT
RANSOMWARE
&
MINING
BESPOKE
ATTACKS
RANSOM /
EXTORTION
ESPIONAGE
SAFELY ENABLING BUSINESS www.securelink.net
THE
CRIMINAL’S
PERSPECTIVE
12
SAFELY ENABLING BUSINESS www.securelink.net19/05/2019
GEOPOLITICS
THE AGE OF CYBER WARFARE
13
Showing
destruction
Filling
budget gaps
Gentleman
spies
SAFELY ENABLING BUSINESS www.securelink.net2019-05-1914
TOTAL SYSTEM FAILURE
SAFELY ENABLING BUSINESS www.securelink.net19/05/2019
We still
encounter
“Wannacry”
Sometimes for
understandable
reasons
WE NEED TO EVOLVE, BUT… WE DON’T.
Depressing
CSIRT
tales
Single factor
+ cloud
=
guaranteed
pwnage
15
SAFELY ENABLING BUSINESS www.securelink.net2019-05-19
• FORCED HUMAN ERROR – Social engineering
• CONFIGURATION ERROR – Website / CMS hacking
• BUDGET ERROR – Diginotar
• 3RD PARTY ERROR – Supply chain attacks
• ARCHITECTURAL ERROR – Wannacry
• BUG
REASONS WE GET PWNED
16
SAFELY ENABLING BUSINESS www.securelink.net2019-05-19
• OF COURSE
SECURE
CODING
MATTERS!
• But we can’t
reverse time:
IF SECURE CODING ISN’T THE ANSWER…
WHAT IS?
• Learn & do better
• APPSEC is going
to be the #1
concern in the
future
• In the mean time,
plugging holes
• The system is
weak & full of
errors
• Most attacks are
“system” attacks
(people, process,
tech)
17
Safely Enabling Business www.securelink.de
ANNUAL SECURITY REPORT
https://lp.securelink.net/asr
19/05/201918
SAFELY ENABLING
BUSINESS

More Related Content

Similar to Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 

Similar to Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019 (20)

Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Find IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site FasterFind IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site Faster
 
IoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The InternetIoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The Internet
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIOMSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
 
[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...
[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...
[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 

More from Codemotion

More from Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 
Mike Kotsur - What can philosophy teach us about programming - Codemotion Ams...
Mike Kotsur - What can philosophy teach us about programming - Codemotion Ams...Mike Kotsur - What can philosophy teach us about programming - Codemotion Ams...
Mike Kotsur - What can philosophy teach us about programming - Codemotion Ams...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019

  • 1. SAFELY ENABLING BUSINESS www.securelink.net 2 0 . 0 0 0 a t t a c k s b y p a s s i n g o u r d e f e n s e s a n d w h y s e c u r e c o d i n g i s n ’ t t h e a n s w e r E w a r d D r i e h u i s • @ e 3 h u i s • w w w . s e c u r e l i n k . n e t
  • 2. SAFELY ENABLING BUSINESS www.securelink.net THIS STORY IS BASED ON TRUE DATA • 24 years in tech / software & security • 700+ SecureLinkers • 2100 customers in 2018 • 5 Cyber Defense Centers • Over 10 trillion signals 2019-05-192 RESEARCH
  • 3. SAFELY ENABLING BUSINESS www.securelink.net32019-05-19 Once upon a time….
  • 4. SAFELY ENABLING BUSINESS www.securelink.net42019-05-19 2006 - 2010 2013 2017 2019
  • 5. SAFELY ENABLING BUSINESS www.securelink.net19/05/2019 A LOOK AT OUR NUMBERS 5 • Signal to incident process • Layered detection: malware wins • Many “strange events”
  • 6. SAFELY ENABLING BUSINESS www.securelink.net19/05/2019 • Cybercriminals & spies using same methods: social engineering • Automated scanning: software & versions, password stuffing LET’S TALK INITIAL ATTACK VECTORS 6
  • 7. Safely Enabling Business www.securelink.de19/05/2019 BIGGER IS MORE SECURE 7 ATTACK FACTOR per 100/employees 9.1 1.5 1.3
  • 8. SAFELY ENABLING BUSINESS www.securelink.net19/05/2019 • Ransomware is hard work • Cryptojacking super easy • Cryptojacking surpassed ransomware • … For a while. It’s not as big as some say it is. THE YEAR CRYPTOJACKING TOOK OVER? 8 jan feb mrt apr mei jun jul aug sep okt nov dec CryptoJacking Ransomware
  • 9. SAFELY ENABLING BUSINESS www.securelink.net9
  • 10. SAFELY ENABLING BUSINESS www.securelink.net OPPORTUNITY FOR VETERAN CRIMINALS 2019-05-1910 Quietly enter network • Look for value • Steal or extort value Plan B • Destroy online back-ups • Ransom network • Extort enterprise ransom
  • 11. SAFELY ENABLING BUSINESS www.securelink.net THE POWER OF BIG NUMBERS 11 BIG DATA RETAIL FRAUD CREDIT CARD THEFT RANSOMWARE & MINING BESPOKE ATTACKS RANSOM / EXTORTION ESPIONAGE
  • 12. SAFELY ENABLING BUSINESS www.securelink.net THE CRIMINAL’S PERSPECTIVE 12
  • 13. SAFELY ENABLING BUSINESS www.securelink.net19/05/2019 GEOPOLITICS THE AGE OF CYBER WARFARE 13 Showing destruction Filling budget gaps Gentleman spies
  • 14. SAFELY ENABLING BUSINESS www.securelink.net2019-05-1914 TOTAL SYSTEM FAILURE
  • 15. SAFELY ENABLING BUSINESS www.securelink.net19/05/2019 We still encounter “Wannacry” Sometimes for understandable reasons WE NEED TO EVOLVE, BUT… WE DON’T. Depressing CSIRT tales Single factor + cloud = guaranteed pwnage 15
  • 16. SAFELY ENABLING BUSINESS www.securelink.net2019-05-19 • FORCED HUMAN ERROR – Social engineering • CONFIGURATION ERROR – Website / CMS hacking • BUDGET ERROR – Diginotar • 3RD PARTY ERROR – Supply chain attacks • ARCHITECTURAL ERROR – Wannacry • BUG REASONS WE GET PWNED 16
  • 17. SAFELY ENABLING BUSINESS www.securelink.net2019-05-19 • OF COURSE SECURE CODING MATTERS! • But we can’t reverse time: IF SECURE CODING ISN’T THE ANSWER… WHAT IS? • Learn & do better • APPSEC is going to be the #1 concern in the future • In the mean time, plugging holes • The system is weak & full of errors • Most attacks are “system” attacks (people, process, tech) 17
  • 18. Safely Enabling Business www.securelink.de ANNUAL SECURITY REPORT https://lp.securelink.net/asr 19/05/201918 SAFELY ENABLING BUSINESS

Editor's Notes

  1. (With this background they now see the benefits of these “numbers”) Take your time and walk through every bullet.