https://www.meetup.com/cybersecurity-digital-trust/
https://www.meetup.com/cybersecurity-digital-trust/events/289368916/
Hi All, Let's get together and talk Cyber Security + enjoy free pizza!
We're professionals in the technology space, and we're starting a new meetup to address modern cybersecurity challenges.
Through these events, we aim to:
- Share ideas, best practices, and case studies
- Present the latest risks and developments in cybersecurity
- Practice cybersecurity problems and solutions
- Support each other via networking opportunities and broadening our business understanding of related topics
For this initial meetup, we will be covering a technical analysis of the 2022 Optus data leak, and the corporate impact this is having on digital governance in Australia.
And we will expand the conversation to zero-trust systems, and some recent developments in the cybersecurity space such as webauthn, web3, secrets management... etc.
Potential topics for future events:
* centralisation/decentralisation of digital assets
* increasing risk due to secret sprawl
* software supply chain security
* zero-trust, trustless systems and how we got here from Snowden NSA leaks
* case studies like the 2022 Optus data leak
* identity fraud and developments in digital identity
We hope this will create a community for professionals to share ideas and tips on how companies can improve their capabilities and most importantly create a safe and fun environment for everyone.
18. Why did this leak occur? We can think of this in 2 ways, outside-in and inside-out.
From an outside-in perspective:
From an inside-out perspective:
19. Why did this leak occur? We can think of this in 2 ways, outside-in and inside-out.
From an outside-in perspective
Lack of (or poor) security audit
Lack of interface visibility (not truly understanding the data perimeter
Lack of monitoring of endpoints - We believe that Optus did in fact monitor the
exfiltration and shutdown the endpoint.
From an inside-out perspective:
20. Why did this leak occur? We can think of this in 2 ways, outside-in and inside-out.
From an outside-in perspective
Lack of (or poor) security audit
Lack of interface visibility (not truly understanding the data perimeter
Lack of monitoring of endpoints - We believe that Optus did in fact monitor the
exfiltration and shutdown the endpoint.
From an inside-out perspective
Bad opsec security policies that would allow such an endpoint to be created in the first
place by developers or system administrators
Systems are not built "secure by default", or "correct by construction", instead they are
built insecure by default, and then security is bolted on top afterwards (security as an
after thought)
Lack of zero-trust, assuming that only a certain kinds of perimeter is needed, and not
encapsulating this information behind multiple-layers - defence in depth
22. Digital assets unlike physical assets start out being invisible.
Changes are invisible.
Perimeter is invisible.
Access is invisible.
To make digital systems visible, we need to consider both outside-in and inside-out approaches:
You can’t secure what you can’t see.
As systems get more complex, systems and secrets starts to sprawl out.
Outside-In Inside-Out
Monitorin
Visualisation -
dashboards that visualises
the digital castle
Secure by defaul
Logs
23. Future Risks and Future Developments
Zero Trust Architectur
Software Supply Chai
Secret Spraw
Centralised vs Decentralise
What is Trust?
What is trust? That’s a philosophical question to be explored in a different presentation!
24. Zero Trust
Back in 2013, Snowden revealed the extent of NSA spying in US datacenters
26. Moving to a world of Trustless (Never Trust, but Verify) Systems
End to End Encryption and Authentication at
every layer provides defense in depth
Fine-Grained Access Contro
Principle of Least Privileg
Confused Deputy Attack
Decentralised Control - Checks & Balances
Reduced Blast Radius - Limits Cascading Failure
Secure by Default
Increased Complexity - AWS IAM
Decreased Logistical Agility -
Lazy circumvention
Cybersecurity Bureaucracy?
Benefits
Costs
27. We need better frameworks and tools to shift magnify the benefits and reduce the costs
Sovereign
Identity
E2EE VPNs instead of Client Server VPNs
Capability-based Security rather than complex
and brittle and indecipherable access policies.
Access control policy requires a visual programming language.
Solutions?
No solutions.
But multiple developments
in token management
and policy engines.
29. Secret Sprawl
(it’s kind of like Shadow IT)
Open Source
Decentralised
Secrets Manager
and Trust System
30. Centralised vs Decentralised
It’s about control.
Not about technology.
Single Point of Failure
Redundancy
Users as Stakeholders
Users as Consumers
Sovereign Identity
Sovereign Data
Outsourcing
Economies of Scale
Biased towards Outside-In
Security
(Security Perimeters)
(VPNs)
(Centralised Authority)
Biased towards
Inside-Out Security
(Foolproof)
(Trustless Systems)
(Zero Knowledge
Proofs)
Borderless and
Accessibility
The pendulum is swinging