It's the people, stupid.

It’s	
  the	
  people,	
  stupid.	
  
@jschauma	
  Jan	
  Schaumann	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
It's the people, stupid.
It's the people, stupid.
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
ServerUserless	
  Systems	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Useless	
  Systems	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Change	
  vs.	
  more	
  of	
  the	
  same.	
  
The	
  people,	
  stupid.	
  
Don’t	
  forget	
  malware.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Developers	
  
@jschauma	
  
•  That	
  can’t	
  happen.	
  
•  That	
  doesn’t	
  happen	
  on	
  
my	
  machine.	
  
•  That	
  shouldn’t	
  happen.	
  
•  Why	
  does	
  that	
  happen?	
  
•  Oh,	
  I	
  see.	
  
•  How	
  did	
  that	
  ever	
  work?	
  
Developers	
  
SRE	
  
@jschauma	
  
•  That	
  never	
  worked.	
  
•  Must	
  be	
  the	
  network.	
  
Developers	
  
SysAdmins	
  
@jschauma	
  
•  It’s	
  not	
  the	
  network.	
  
•  Probably	
  a	
  bug	
  in	
  the	
  OS.	
  
•  Oh,	
  ok.	
  DNS.	
  
•  Don’t	
  monkey	
  around	
  with	
  /etc/hosts.	
  
SRE	
  
Developers	
  
SysAdmins	
  
BOFH	
  
@jschauma	
  
•  An	
  African	
  or	
  European	
  swallow?	
  
•  You	
  don’t	
  know	
  what	
  you’re	
  doing.	
  
SRE	
  
Developers	
  
SysAdmins	
  
BOFH	
  
Infosec	
  
@jschauma	
  
•  That’s	
  not	
  how	
  you	
  do	
  this.	
  
•  Nobody	
  knows	
  what	
  they’re	
  doing.	
  
SRE	
  
Developers	
  
SysAdmins	
  
BOFH	
  
Infosec	
  
New	
  Yorkers	
  
@jschauma	
  
•  What?	
  I	
  don’t	
  care,	
  keep	
  walking.	
  Don’t	
  talk	
  to	
  me.	
  
•  Seriously,	
  don’t	
  stop	
  in	
  the	
  middle	
  of	
  the	
  street.	
  
	
  	
  	
  	
  	
  	
  I	
  will	
  cut	
  you.	
  
SRE	
  
Developers	
  
SysAdmins	
  
BOFH	
  
Infosec	
  
New	
  Yorkers	
  
New	
  York	
  Infosec	
  SysAdmin	
  
@jschauma	
  
SRE	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
How	
  not	
  to	
  be	
  seen	
  
@jschauma	
  
Changing	
  other	
  people’s	
  habits	
  is	
  a	
  
wicked	
  problem.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Prod	
  
Corp	
  
Long-­‐lived	
  SSH	
  ConnecCons	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Firewall	
  /	
  ACLs	
  /	
  
idled(8)	
  …	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Reverse	
  SSH	
  tunnel	
  
Privkeys	
  on	
  prod	
  
cron(8)	
  iniCated	
  callbacks	
  
…	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  hLps://is.gd/80zCWX	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
Why	
  we	
  take	
  our	
  shoes	
  off	
  at	
  the	
  airport.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
NSA-­‐proofing	
  TLS	
  
cipher	
  spec	
  LiSle	
  Bobby	
  Tables	
  
Secrets	
  on	
  GitHub	
  
XSS	
  
#Infosec:	
  Silicon	
  Valley’s	
  TSA	
  
Velocity	
  NY	
  2016	
  
Security	
  is	
  not	
  a	
  value.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Nobody	
  cares	
  about	
  security.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Nobody	
  cares	
  about	
  security.	
  
That	
  is	
  neither	
  incompetence	
  nor	
  
malice,	
  it’s	
  pragmaSsm.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
People	
  driven	
  defense	
  
EffecCve	
  defense	
  
“sophisCcated”	
  
“military	
  grade	
  encrypCon”	
  
“NSA-­‐proof”	
  
“even	
  more	
  cyber”	
  
“cyber”	
  
Vendor	
  Crap	
  “Security	
  Appliances”	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
Ceci n’est pas un hacker.
Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Safety,	
  not	
  (just)	
  security.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
A	
  system	
  is	
  secure	
  if	
  it	
  protects	
  the	
  
user	
  when	
  used	
  correctly.	
  
	
  
A	
  system	
  is	
  safe	
  if	
  it	
  protects	
  the	
  user	
  
even	
  when	
  used	
  incorrectly.	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  
If	
  your	
  reacSon	
  is	
  “well,	
  not	
  like	
  that”,	
  
you	
  have	
  a	
  poka-­‐yoke	
  problem.	
  
	
  
Fix	
  that.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
The	
  most	
  convenient	
  /	
  intuiSve	
  
way	
  to	
  use	
  your	
  applicaSon	
  must	
  be	
  
the	
  safest	
  way	
  to	
  use	
  your	
  applicaSon.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Users	
  will	
  not	
  change	
  default	
  sengs.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Users	
  will	
  not	
  change	
  default	
  sengs.	
  
(Unless	
  a	
  less	
  secure	
  opSon	
  is	
  available.)	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Failure	
  must	
  not	
  lead	
  the	
  user	
  to	
  
change	
  their	
  default	
  sengs.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Failure	
  must	
  not	
  lead	
  the	
  user	
  to	
  
change	
  their	
  default	
  sengs.	
  
	
  
Safety	
  overrides	
  must	
  be	
  temporary.	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  
Your	
  applicaSons,	
  services,	
  standards,	
  
etc.,	
  must	
  age	
  gracefully.	
  
Velocity	
  NY	
  2016	
  
Poka-­‐yoke	
  so^ware	
  &	
  systems	
  
•  safe	
  defaults	
  
•  safe	
  failure	
  mode	
  
•  automated,	
  regular,	
  unaLended	
  updates	
  
•  puts	
  usability	
  ahead	
  of	
  ‘security’	
  
•  encourages	
  desired	
  behavior	
  
•  builds	
  /	
  strengthens	
  safe	
  habits	
  
•  follows	
  the	
  users’	
  desire	
  path	
  
Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
Change	
  vs.	
  more	
  of	
  the	
  same	
  
•  avoid	
  the	
  downward	
  spiral	
  of	
  cynicism	
  
•  your	
  users,	
  developers,	
  engineers,	
  …	
  are	
  not	
  stupid;	
  they’re	
  
trying	
  to	
  get	
  their	
  job	
  done	
  
•  focus	
  on	
  realisSc	
  threats,	
  not	
  high-­‐profile	
  security	
  theater	
  
•  understand	
  that	
  your	
  aLackers	
  are	
  moSvated,	
  dedicated,	
  
human	
  adversaries	
  
The	
  people,	
  stupid.	
  
•  security	
  is	
  not	
  an	
  end-­‐goal	
  
•  build	
  safe	
  applicaSons	
  &	
  services	
  
•  understand	
  your	
  users’	
  desire	
  paths	
  
•  Poka-­‐yoke	
  Go!	
  
@jschauma	
  Velocity	
  NY	
  2016	
  
“Fundamentally,	
  
the	
  problem	
  isn’t	
  
about	
  security.	
  It’s	
  
about	
  people.”	
  
@jschauma	
  
-­‐	
  Bill	
  Clinton	
  (not	
  quite)	
  
Thanks!	
  
Image	
  ALribuSons	
  
•  Monty	
  Python,	
  Paul	
  Townsend	
  hLps://flic.kr/p/nVFKH5	
  
•  Serverless,	
  PolarFlex	
  Rack	
  Blanking	
  
hLp://polargy.com/air-­‐flow-­‐accessories/42u-­‐blanking-­‐
panels.php	
  
•  Downward	
  spiral,	
  Davo	
  Sime	
  
hLps://thenounproject.com/term/downward-­‐spiral/
589704/	
  hLps://creaSvecommons.org/licenses/by/3.0/us/	
  
•  Mouse,	
  MarSn	
  Driver,	
  
hLp://wallpapersafari.com/w/UzqRxW	
  
•  Silly	
  Walk	
  Street	
  Sign,	
  Kayla	
  Reed,	
  
hLp://www.avclub.com/arScle/crosswalk-­‐norway-­‐makes-­‐
ciSzens-­‐do-­‐monty-­‐python-­‐si-­‐203164	
  
	
  
@jschauma	
  
1 of 70

Recommended

Crazy Like A Fox - #Infosec Ideas That Just Might Work by
Crazy Like A Fox - #Infosec Ideas That Just Might WorkCrazy Like A Fox - #Infosec Ideas That Just Might Work
Crazy Like A Fox - #Infosec Ideas That Just Might WorkJan Schaumann
780 views20 slides
Know Your Enemy - An Introduction to Threat Modeling by
Know Your Enemy - An Introduction to Threat ModelingKnow Your Enemy - An Introduction to Threat Modeling
Know Your Enemy - An Introduction to Threat ModelingJan Schaumann
1.4K views50 slides
OpSec101 by
OpSec101OpSec101
OpSec101Jan Schaumann
788 views49 slides
Everything is Awful (And You're Not Helping) by
Everything is Awful (And You're Not Helping)Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)Jan Schaumann
1.9K views71 slides
Primum non nocere - Ethical Obligations in Internet Operations by
Primum non nocere - Ethical Obligations in Internet OperationsPrimum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet OperationsJan Schaumann
4K views47 slides
Semper Ubi Sub Ubi - Things They Don't Teach You In School by
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolSemper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolJan Schaumann
1.5K views75 slides

More Related Content

Viewers also liked

Menoovr by
Menoovr Menoovr
Menoovr menoovr
2.7K views13 slides
Where in the publishing world are libraries? by
Where in the publishing world are libraries?Where in the publishing world are libraries?
Where in the publishing world are libraries?Katie Dunneback
4.2K views40 slides
State of the Internet Operating System: Web2 expo10 by
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10Tim O'Reilly
11.3K views51 slides
Where 2.0 Perch Product Launch Presentation by
Where 2.0 Perch Product Launch PresentationWhere 2.0 Perch Product Launch Presentation
Where 2.0 Perch Product Launch Presentationperryevans
4.9K views6 slides
webfonts & @font-face :: in brief by
webfonts & @font-face :: in briefwebfonts & @font-face :: in brief
webfonts & @font-face :: in briefPaul Irish
11.4K views28 slides
Epub in the wild by
Epub in the wildEpub in the wild
Epub in the wildliz_castro
8.3K views59 slides

Viewers also liked(20)

Menoovr by menoovr
Menoovr Menoovr
Menoovr
menoovr2.7K views
Where in the publishing world are libraries? by Katie Dunneback
Where in the publishing world are libraries?Where in the publishing world are libraries?
Where in the publishing world are libraries?
Katie Dunneback4.2K views
State of the Internet Operating System: Web2 expo10 by Tim O'Reilly
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10
Tim O'Reilly11.3K views
Where 2.0 Perch Product Launch Presentation by perryevans
Where 2.0 Perch Product Launch PresentationWhere 2.0 Perch Product Launch Presentation
Where 2.0 Perch Product Launch Presentation
perryevans4.9K views
webfonts & @font-face :: in brief by Paul Irish
webfonts & @font-face :: in briefwebfonts & @font-face :: in brief
webfonts & @font-face :: in brief
Paul Irish11.4K views
Epub in the wild by liz_castro
Epub in the wildEpub in the wild
Epub in the wild
liz_castro8.3K views
Strata Conference 2014 NYC with Twitter by Taewook Eom
Strata Conference 2014 NYC with TwitterStrata Conference 2014 NYC with Twitter
Strata Conference 2014 NYC with Twitter
Taewook Eom2.8K views
Using WordPress for Digital Workflows and More by Kirk Biglione
Using WordPress for Digital Workflows and MoreUsing WordPress for Digital Workflows and More
Using WordPress for Digital Workflows and More
Kirk Biglione3.5K views
Better Bash - Unit and Integration Testing by C.J. Jameson
Better Bash - Unit and Integration TestingBetter Bash - Unit and Integration Testing
Better Bash - Unit and Integration Testing
C.J. Jameson2.4K views
(Short version) Building a Mobile, Social, Location-Based Game in 5 Weeks by Jennie Lees
(Short version) Building a Mobile, Social, Location-Based Game in 5 Weeks(Short version) Building a Mobile, Social, Location-Based Game in 5 Weeks
(Short version) Building a Mobile, Social, Location-Based Game in 5 Weeks
Jennie Lees13.5K views
Kobo: What Do eBook Customers Really, Really Want? (Tools of Change 2011) by MTamblyn
Kobo: What Do eBook Customers Really, Really Want? (Tools of Change 2011)Kobo: What Do eBook Customers Really, Really Want? (Tools of Change 2011)
Kobo: What Do eBook Customers Really, Really Want? (Tools of Change 2011)
MTamblyn3.1K views
Mobilising the world's Natural History - Open Data + Citizen Science by Margaret Gold
Mobilising the world's Natural History - Open Data + Citizen ScienceMobilising the world's Natural History - Open Data + Citizen Science
Mobilising the world's Natural History - Open Data + Citizen Science
Margaret Gold1.4K views
Social Gold: The Design of FarmVille and Other Social Games (Web2Expo 2010) by Amitt Mahajan
Social Gold: The Design of FarmVille and Other Social Games (Web2Expo 2010)Social Gold: The Design of FarmVille and Other Social Games (Web2Expo 2010)
Social Gold: The Design of FarmVille and Other Social Games (Web2Expo 2010)
Amitt Mahajan7.5K views
Smaller, Flatter, Smarter by Web 2.0 Expo
Smaller, Flatter, SmarterSmaller, Flatter, Smarter
Smaller, Flatter, Smarter
Web 2.0 Expo3.3K views
Data Science and Smart Systems: Creating the Digital Brain by VMware Tanzu
Data Science and Smart Systems: Creating the Digital Brain Data Science and Smart Systems: Creating the Digital Brain
Data Science and Smart Systems: Creating the Digital Brain
VMware Tanzu3.3K views
Web 2.0 Expo Speech: Open Leadership by Charlene Li
Web 2.0 Expo Speech: Open LeadershipWeb 2.0 Expo Speech: Open Leadership
Web 2.0 Expo Speech: Open Leadership
Charlene Li13.4K views
Hadoop's Impact on the Future of Data Management | Amr Awadallah by Cloudera, Inc.
Hadoop's Impact on the Future of Data Management | Amr AwadallahHadoop's Impact on the Future of Data Management | Amr Awadallah
Hadoop's Impact on the Future of Data Management | Amr Awadallah
Cloudera, Inc.4.8K views
Locked Out in London (and tweeting about it) - version with my notes by Sylvain Carle
Locked Out in London (and tweeting about it) - version with my notesLocked Out in London (and tweeting about it) - version with my notes
Locked Out in London (and tweeting about it) - version with my notes
Sylvain Carle9.4K views

Similar to It's the people, stupid.

Securing Rails by
Securing RailsSecuring Rails
Securing RailsAlex Payne
1.4K views32 slides
Test & Tea : ITSEC testing, manual vs automated by
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedZoltan Balazs
447 views17 slides
Penetration testing as an internal audit activity by
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activityTranscendent Group
2.1K views23 slides
Evaluating Web App, Mobile App, and API Security - Matt Cohen by
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenInman News
199 views46 slides
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx by
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmxMoved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmxMilen Dyankov
35.8K views60 slides
Continues Deployment - Tech Talk week by
Continues Deployment - Tech Talk weekContinues Deployment - Tech Talk week
Continues Deployment - Tech Talk weekrantav
1.2K views53 slides

Similar to It's the people, stupid.(20)

Securing Rails by Alex Payne
Securing RailsSecuring Rails
Securing Rails
Alex Payne1.4K views
Test & Tea : ITSEC testing, manual vs automated by Zoltan Balazs
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs447 views
Penetration testing as an internal audit activity by Transcendent Group
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activity
Transcendent Group2.1K views
Evaluating Web App, Mobile App, and API Security - Matt Cohen by Inman News
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Inman News199 views
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx by Milen Dyankov
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmxMoved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
Milen Dyankov35.8K views
Continues Deployment - Tech Talk week by rantav
Continues Deployment - Tech Talk weekContinues Deployment - Tech Talk week
Continues Deployment - Tech Talk week
rantav1.2K views
Hadoop application architectures - Fraud detection tutorial by hadooparchbook
Hadoop application architectures - Fraud detection tutorialHadoop application architectures - Fraud detection tutorial
Hadoop application architectures - Fraud detection tutorial
hadooparchbook2K views
PCI OWASP Course Storyboard by Jim Piechocki
PCI OWASP Course StoryboardPCI OWASP Course Storyboard
PCI OWASP Course Storyboard
Jim Piechocki141 views
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi... by Burr Sutter
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Burr Sutter1.4K views
It new2015 by Shyam Sir
It new2015It new2015
It new2015
Shyam Sir359 views
The present and future of Serverless observability (Serverless Computing London) by Yan Cui
The present and future of Serverless observability (Serverless Computing London)The present and future of Serverless observability (Serverless Computing London)
The present and future of Serverless observability (Serverless Computing London)
Yan Cui2K views
Secure Coding for Java - An Introduction by Sebastien Gioria
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria1.5K views
Secure Coding for Java - An introduction by Sebastien Gioria
Secure Coding for Java - An introductionSecure Coding for Java - An introduction
Secure Coding for Java - An introduction
Sebastien Gioria1.4K views
QCon Sao Paulo Keynote - Microservices, an Unexpected Journey by Sam Newman
QCon Sao Paulo Keynote - Microservices, an Unexpected JourneyQCon Sao Paulo Keynote - Microservices, an Unexpected Journey
QCon Sao Paulo Keynote - Microservices, an Unexpected Journey
Sam Newman3K views
New Era of Software with modern Application Security v1.0 by Dinis Cruz
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
Dinis Cruz3.4K views
Identity and Access Management - RSA 2017 Security Foundations Seminar by Brian Campbell
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations Seminar
Brian Campbell1.3K views
Progressing JavaScript and Apps the Web way… by Christian Heilmann
 Progressing JavaScript and Apps the Web way…  Progressing JavaScript and Apps the Web way…
Progressing JavaScript and Apps the Web way…
Christian Heilmann1.6K views
[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by ... by CODE BLUE
[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by ...[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by ...
[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by ...
CODE BLUE127 views

More from Jan Schaumann

The Razors Edge - Cutting your TLS Baggage by
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageJan Schaumann
789 views51 slides
Protecting Data in Untrusted Locations by
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsJan Schaumann
2.3K views40 slides
Headless Host Scanning by
Headless Host ScanningHeadless Host Scanning
Headless Host ScanningJan Schaumann
895 views67 slides
Safely Drinking from the Data Waterhose by
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseJan Schaumann
7K views20 slides
PGP for Smarties by
PGP for SmartiesPGP for Smarties
PGP for SmartiesJan Schaumann
3.7K views89 slides
Fancy pants by
Fancy pantsFancy pants
Fancy pantsJan Schaumann
4.8K views86 slides

More from Jan Schaumann(11)

The Razors Edge - Cutting your TLS Baggage by Jan Schaumann
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
Jan Schaumann789 views
Protecting Data in Untrusted Locations by Jan Schaumann
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
Jan Schaumann2.3K views
Safely Drinking from the Data Waterhose by Jan Schaumann
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data Waterhose
Jan Schaumann7K views
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing by Jan Schaumann
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
Jan Schaumann4.7K views

Recently uploaded

SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
25 views38 slides
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
72 views29 slides
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
24 views29 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
345 views20 slides
Design Driven Network Assurance by
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
19 views42 slides
GDSC CTU First Meeting Party by
GDSC CTU First Meeting PartyGDSC CTU First Meeting Party
GDSC CTU First Meeting PartyNational Yang Ming Chiao Tung University
11 views25 slides

Recently uploaded(20)

SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva

It's the people, stupid.