Security Snake Oil Cycle 2019

Jul. 2, 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
Security Snake Oil Cycle 2019
1 of 86

More Related Content

What's hot

Invessed Webinar: Investor Portals are not Rocket ScienceInvessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceTheo Paraskevopoulos
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
PredictiMx H4D Stanford 2019PredictiMx H4D Stanford 2019
PredictiMx H4D Stanford 2019Stanford University
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WaySeniorStoryteller
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsChris Gates
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Versionguest3af00b8

Similar to Security Snake Oil Cycle 2019

Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise InstituteEric Ries
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...Andrew O. Leeth
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed NewsletterYigal Behar
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseSilvioPappalardo

Similar to Security Snake Oil Cycle 2019(20)

Recently uploaded

TSX-V_WIL_2021-DATA.KRESTON.VN.pdfTSX-V_WIL_2021-DATA.KRESTON.VN.pdf
TSX-V_WIL_2021-DATA.KRESTON.VN.pdfThuPhng26102
8 Types of Pipe Expansion Joints and Their Uses.pptx8 Types of Pipe Expansion Joints and Their Uses.pptx
8 Types of Pipe Expansion Joints and Their Uses.pptxFlexpertBellows3
Validation 4 for Credible Pharma 4 a Keynote for  Valconnect 2023.pdfValidation 4 for Credible Pharma 4 a Keynote for  Valconnect 2023.pdf
Validation 4 for Credible Pharma 4 a Keynote for Valconnect 2023.pdfAjaz Hussain
DEI_Consultant_ CV_FECG_2026.pptx.pdfDEI_Consultant_ CV_FECG_2026.pptx.pdf
DEI_Consultant_ CV_FECG_2026.pptx.pdfSeanAFisherSr
9.27.23 Nonprofit Success Slides - HBerger.pdf9.27.23 Nonprofit Success Slides - HBerger.pdf
9.27.23 Nonprofit Success Slides - HBerger.pdfBloomerang
ITIL4 Managing ProfesstioalITIL4 Managing Professtioal
ITIL4 Managing ProfesstioalJerimi Soma

Security Snake Oil Cycle 2019

Editor's Notes

  1. The oil came from Chinese Water Snakes, which were somewhat lacking on the North American continent, so later on when Americans tried to sell off fraudulent cures, snake oil was one of the go-to products to try and reproduce. Starting with rattlesnake oil. Clark Stanley was one such entrepreneur who, at a Chicago exposition: ...reached into a sack, plucked out a snake, slit it open and plunged it into boiling water. When the fat rose to the top, he skimmed it off and used it on the spot to create 'Stanley's Snake Oil,' a liniment that was immediately snapped up by the throng that had gathered to watch the spectacle. Kinda wish I was there to see... The problem was that rattlesnake oil wasn't even nearly as effective as Chinese water snake, and Stanley's product wasn't even using oil to begin with. What investigators eventually found was that it contained: ...mineral oil, a fatty oil believed to be beef fat, red pepper and turpentine. From that day forward, Stanley's scam made snake oil symbolic of fraud. Stanley was charged $20 for his crime (a little under $500 equivalent now).
  2. Hits sec vendors too… need them to do a good job building products
  3. There are currently 90,000 published CVE’s 2017 alone saw a 100% increase in added CVE’s from the previous year A record-breaking number of 20,832 vulnerabilities were discovered in total in 2017, but only 13,160 of these received an official CVE identifier last year*
  4. There are currently 90,000 published CVE’s 2017 alone saw a 100% increase in added CVE’s from the previous year A record-breaking number of 20,832 vulnerabilities were discovered in total in 2017, but only 13,160 of these received an official CVE identifier last year*
  5. Anyone with a credit card can create a data center. New reality of the pub cloud world Really basic problems like simply knowing what servers you have (even what data centers) are back What could possibly go wrong? Previous research carried out by experts from Skyhigh Networks found that 7% of all Amazon S3 buckets are publicly accessible. Over the past few months, security researchers have found a large number of companies that leaked sensitive data this way, via S3 buckets left exposed online. A (most likely incomplete) list of the most notable incidents is included below. ⬨ Top defense contractor Booz Allen Hamilton leaks 60,000 files, including employee security credentials and passwords to a US government system. ⬨ Verizon partner leaks personal records of over 14 million Verizon customers, including names, addresses, account details, and for some victims — account PINs. ⬨ An AWS S3 server leaked the personal details of WWE fans who registered on the company's sites. 3,065,805 users were exposed. ⬨ Another AWS S3 bucket leaked the personal details of over 198 million American voters. The database contained information from three data mining companies known to be associated with the Republican Party. ⬨ Another S3 database left exposed only leaked the personal details of job applications that had Top Secret government clearance. ⬨ Dow Jones, the parent company of the Wall Street Journal, leaked the personal details of 2.2 million customers. ⬨ Omaha-based voting machine firm Election Systems & Software (ES&S) left a database exposed online that contained the personal records of 1.8 million Chicago voters. ⬨ Security researchers discovered a Verizon AWS S3 bucket containing over 100 MB of data about the company's internal system named Distributed Vision Services (DVS), used for billing operations. ⬨ An auto-tracking company leaked over a half of a million records with logins/passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships.
  6. Re-order
  7. Bought off via ads…
  8. They typically do not have the lab environments they require. Most vendors have someone dedicated to lab ops at scale.
  9. frequently boosts scans by 30%, reducing time needed to scan and easing network impact in many instances.”
  10. Beyond normal s/w pressures
  11. How different from normal s/w… more losers, more dynamic
  12. The oil came from Chinese Water Snakes, which were somewhat lacking on the North American continent, so later on when Americans tried to sell off fraudulent cures, snake oil was one of the go-to products to try and reproduce. Starting with rattlesnake oil. Clark Stanley was one such entrepreneur who, at a Chicago exposition: ...reached into a sack, plucked out a snake, slit it open and plunged it into boiling water. When the fat rose to the top, he skimmed it off and used it on the spot to create 'Stanley's Snake Oil,' a liniment that was immediately snapped up by the throng that had gathered to watch the spectacle. Kinda wish I was there to see... The problem was that rattlesnake oil wasn't even nearly as effective as Chinese water snake, and Stanley's product wasn't even using oil to begin with. What investigators eventually found was that it contained: ...mineral oil, a fatty oil believed to be beef fat, red pepper and turpentine. From that day forward, Stanley's scam made snake oil symbolic of fraud. Stanley was charged $20 for his crime (a little under $500 equivalent now).
  13. Care and feeding…. After care Cats and dogs w/ IDS and FW
  14. Understand the solution versus the feature… know the problem that product is trying to solve
  15. The oil came from Chinese Water Snakes, which were somewhat lacking on the North American continent, so later on when Americans tried to sell off fraudulent cures, snake oil was one of the go-to products to try and reproduce. Starting with rattlesnake oil. Clark Stanley was one such entrepreneur who, at a Chicago exposition: ...reached into a sack, plucked out a snake, slit it open and plunged it into boiling water. When the fat rose to the top, he skimmed it off and used it on the spot to create 'Stanley's Snake Oil,' a liniment that was immediately snapped up by the throng that had gathered to watch the spectacle. Kinda wish I was there to see... The problem was that rattlesnake oil wasn't even nearly as effective as Chinese water snake, and Stanley's product wasn't even using oil to begin with. What investigators eventually found was that it contained: ...mineral oil, a fatty oil believed to be beef fat, red pepper and turpentine. From that day forward, Stanley's scam made snake oil symbolic of fraud. Stanley was charged $20 for his crime (a little under $500 equivalent now).