SlideShare a Scribd company logo
1 of 89
SESSION ID:
#RSAC
MODERATOR: PANELISTS:
Wait wait…
Don’t pwn me!
VPT-R11
Mark Miller Jacob West
Joshua Corman
Chris Eng
Senior Storyteller
TheNEXUS Community Project
@TSWAlliance
Chief Architect, Security Products
NetSuite
@sfjacob
Chief Community Officer
Sonatype
Vice President of Research
Veracode
@chriseng
#RSAC
The Panel
2
#RSAC
3
#RSAC
@TSWAlliance
#RSAC
The Rules for Wait Wait… don’t pwn me!
 Each correct answer to the initial question is worth 3 points
 A wrong answer subtracts 2 points
 A pass on a question loses 1 point
 A correct answer from an audience member gets allocated 2 points
to the panelist of their choice
4
#RSAC
The Rules for Wait Wait… don’t pwn me!
5
The moderator may arbitrarily
give or take away points at any time
#RSAC
Online News Resources
 Pandodaily
 Forbes
 Brian Krebs
 Hacker News
 Gizmodo
 Poynter
 Ars Technica
6
 Wired
 Swift on Security
 FBI/CIA/NSA
 WSJ
 CSO
 TechCo
 The Verge
 Kickstarter
#RSAC
7
Swift on Security
#RSAC
Round One
8
Swift on Security
#RSAC
According to Taylor Swift…
9
What’s the difference between
viruses, trojans, worms, etc?
#RSAC
10
#RSAC
According to Taylor Swift…
11
Cyber war doesn’t determine who is right…
#RSAC
12
#RSAC
According to Taylor Swift…
13
“Maybe we should send people who
don’t celebrate earth day to… <where>”
#RSAC
14
#RSAC
15
Three Letter Agencies
#RSAC
Three Letter Agencies
What 3 letter agency has placed $3M
bounty for the ZeuS Trojan author?
 FBI
 CIA
 NSA
 All of the Above
16
#RSAC
17
#RSAC
Three Letter Agencies
What 3 letter agency planned to hijack
Apple’s developer tools?
 FBI
 CIA
 NSA
 All of the Above
18
#RSAC
19
#RSAC
Three Letter Agencies
What 3 letter agency developed planes
that scrape cellphone data?
 FBI
 CIA
 NSA
 All of the Above
20
#RSAC
21
#RSAC
22
Strange But True
#RSAC
Strange But True
Rightcorps bills pirates for $20 a song.
To the nearest $1M, how much money
has the company made so far?
23
#RSAC
24
#RSAC
Strange But True
Within 10,000, how many emails does
Senator Lindsey Graham say he has sent
from his personal account?
25
#RSAC
26
#RSAC
Strange But True
What is the 2nd most funded product on
Kickstarter?
27
#RSAC
28
#RSAC
29
Bluff the Panel
#RSAC
Bluff the Panel
For three days in early April, Google maps
did what?
 Put treasure chest markers in 100 street locations in New York
City that could be redeemed for $100 each
 Let you play Pac Man on the streets of New York using
Google View
 Mis-directed people who were going from 14th Street Union
Square to 16 Street Barnes & Noble, and had them go 24
miles by way of Brooklyn and Queens, over two bridges and
through one tunnel
30
#RSAC
31
#RSAC
Bluff the Panel
According to Edward Snowden, who is
110% sexy?
32
#RSAC
33
#RSAC
Bluff the Panel
Why did prosecutors drop all charges in
a pistol whipping robbery in St. Louis
 The perp was part of a witness protection program for
informers from the group Anonymous
 To protect a cell-site simulator called stingray
 Detectives discovered the event occurred inside Grand
Theft Auto, but was reported as real
34
#RSAC
35
#RSAC
36
At the Conference
#RSAC
At the Conference
What is the financial value of your
personal information at RSAC this year?
37
#RSAC
38
#RSAC
At the Conference
In 95% of the cases, how
did attackers breach a
system?
39
#RSAC
40
#RSAC
At the Conference
“Who needs zero-day when
you’ve got <what>?” – Amit
Yoran
41
#RSAC
42
Stupid!
#RSAC
At the Conference
According to research by Kim Zetter, how
many Windows machines are currently
infected with Stuxnet?
43
#RSAC
At the Conference
3 Million +
44
#RSAC
At the Conference
In the same research on Stuxnet, Zetter
declared that 30 days worth of normal
activity was recorded by the virus. How
was the “normal” activity used?
45
#RSAC
At the Conference
Fed back normal data to
the centrifuge dashboard
to hide the current activity
46
#RSAC
At the Conference
Techno Creep author, Dr. Tom Keenan,
insists that this is the “creepiest place in
America”.
47
#RSAC
At the Conference
Any Disney
theme park
48
#RSAC
49
Audience Limerick Challenge
#RSAC
Audience Limerick Challenge
50
“When I think of something so thrilling
As a concept that’s well worth it's drilling,
I talk to my minions, who have strong opinions
On info sec, so un****…”
Taylor Swift
#RSAC
51
#RSAC
Audience Limerick Challenge
52
“There once was a general who scared us
Giving his mistress info she shared up.
The case is now done, and he's basically won.
With a 40,000 dollar fine for …”
#RSAC
53
#RSAC
54
Verizon Data Breach Report
#RSAC
Verizon Data Breach Report
55
Within 5%, how many
recipients still open phishing
emails?
#RSAC
56
#RSAC
Verizon Data Breach Report
57
Within 5%, what percentage of
vulnerabilities were
compromised more than one
year after the CVE was
published?
#RSAC
58
#RSAC
Verizon Data Breach Report
59
Within $1000, how much was
the average loss for a breach of
1000 records?
#RSAC
60
#RSAC
61
Scary but True
#RSAC
Scary but True
62
A security flaw in a well known drug pump
allows hackers to do what?
Wired Magazine
#RSAC
63
#RSAC
Scary but True
64
What was Mark Hamill’s greatest fear if he
turned down the role of Luke Skywalker in the
upcoming Star Wars Movie?
Entertain This
#RSAC
65
#RSAC
Scary but True
66
Why was Chris Roberts, a prominent computer
security expert, not allowed to board a United
Flight last week?
International Business Times
#RSAC
67
#RSAC
Scary but True
68
What is the weakest security link that is
impossible to lock down in most homes?
Wall Street Journal
#RSAC
69
#RSAC
Scary but True
70
According to researcher Scott Bryner, users of
Match.com are practicing unsafe <what>?
Wall Street Journal
#RSAC
71
#RSAC
Scary but True
72
Bonus Question: What was Scott Bryner doing
on Match.com?
Practicing safe protocols, of course.
#RSAC
Scary but True
73
To the nearest penny, how much money are half
the app markers spending on security?
Venture Beat
#RSAC
74
#RSAC
Scary but True
75
An 18 year old unpatched vulnerability affects
all versions of what?
Venture Beat
#RSAC
76
#RSAC
77
Final Round
#RSAC
Final Round
78
A man in Colorado was charged last week for
doing something to his computer. He was cited
and released. What did he do?
#RSAC
79
#RSAC
Final Round
80
According to a recent report by Stuart McClure,
CEO of computer security firm Cylance, what is
the final conclusion on how hackers were able
to access the Sony network?
#RSAC
81
#RSAC
Bluff the Panel
On April 17, 2015 what band did Alex W.
Gibbons declare the “Worst. Boyband.
Everrr”?
 Wham!
 One Direction
 This Panel
82
#RSAC
83
#RSAC
84
What’s the final score?
#RSAC
Thank You to the The Panel
85
#RSAC
86
Get a copy of the slides for this
show immediately…
#RSAC
87
community@sonatype.com
#RSAC
88
Thank you to the team at RSAC
for making all this possible
SESSION ID:
#RSAC
MODERATOR: PANELISTS:
Wait wait…
Don’t pwn me!
VPT-R11
Mark Miller Jacob West
Joshua Corman
Chris Eng
Senior Storyteller
TheNEXUS Community Project
@TSWAlliance
Chief Architect, Security Products
NetSuite
@sfjacob
Chief Community Officer
Sonatype
Vice President of Research
Veracode
@chriseng

More Related Content

Similar to RSAC Panel Game Show

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresNothing Nowhere
 
A Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkA Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkNothing Nowhere
 
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesWayne Huang
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FuturePriyanka Aash
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverJAX Chamber IT Council
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesPriyanka Aash
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
Dreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat IntelligenceDreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat IntelligencePriyanka Aash
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)Felipe Prado
 
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!SeniorStoryteller
 
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-Brands
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-BrandsOnalytica-CyberSecurity-2015-Top-100-Influencers-And-Brands
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-BrandsMark W. Bennett
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 

Similar to RSAC Panel Game Show (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 
A Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkA Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - Mork
 
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ Websites
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Dreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat IntelligenceDreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat Intelligence
 
Unwelcome Network Surprises
Unwelcome Network SurprisesUnwelcome Network Surprises
Unwelcome Network Surprises
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)2600 v12 n1 (spring 1995)
2600 v12 n1 (spring 1995)
 
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
 
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-Brands
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-BrandsOnalytica-CyberSecurity-2015-Top-100-Influencers-And-Brands
Onalytica-CyberSecurity-2015-Top-100-Influencers-And-Brands
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

RSAC Panel Game Show

Editor's Notes

  1. From TheNEXUS Community Project and RSA Conference 2015, this is "Wait wait... don't pwn me!", the DevOps and Security news quizz.
  2. Right now panel, it is time for you to answer some questions about this month's news. We'll start with Swift on Security...
  3. … as in Taylor Swift, "blending Swift's girlish romanticism with biting security sarcasm".
  4. https://twitter.com/SwiftOnSecurity
  5. http://securityintelligence.com/what-does-taylor-swift-know-about-data-security/#.VTkLFCFVikp
  6. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  7. krebsonsecurity.com/2015/02/fbi-3m-bounty-for-zeus-trojan-author
  8. http://www.engadget.com/2015/03/10/cia-hijack-apple-developer-tools/
  9. http://www.theverge.com/2015/3/10/8184255/CIA-airplane-phone-surveillance-US-marshal
  10. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  11. http://arstechnica.com/tech-policy/2015/03/rightscorp-bills-pirates-for-20-a-song-burns-more-money-than-ever/ Company says it's a "pioneer in the fight against piracy," loses $3.4 million.
  12. http://pando.com/2015/03/09/this-member-of-congress-has-never-sent-an-email-even-though-hes-on-a-tech-and-privacy-focused-subcommittee/ (R) South Carolina
  13. https://www.kickstarter.com/projects/ryangrepper/coolest-cooler-21st-century-cooler-thats-actually?ref=most_funded
  14. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  15. http://www.wired.com/2015/04/snowden-sexy-margaret-thatcher-password-isnt-so-sexy/
  16. http://arstechnica.com/tech-policy/2015/04/prosecutors-drop-robbery-case-to-preserve-stingray-secrecy-in-st-louis/
  17. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  18. http://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/077043617X
  19. http://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/077043617X
  20. http://www.amazon.com/Technocreep-Surrender-Privacy-Capitalization-Intimacy/dp/1771641223/
  21. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  22. http://www.reuters.com/article/2015/04/23/us-usa-petraeus-idUSKBN0NE15520150423
  23. http://www.verizonenterprise.com/DBIR/2015/?&keyword=p6922140298
  24. http://www.verizonenterprise.com/DBIR/2015/?&keyword=p6922140298
  25. http://www.verizonenterprise.com/DBIR/2015/?&keyword=p6922140298
  26. http://www.verizonenterprise.com/DBIR/2015/?&keyword=p6922140298
  27. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  28. http://www.wired.com/2015/04/drug-pumps-security-flaw-lets-hackers-raise-dose-limits/
  29. http://entertainthis.usatoday.com/2015/04/19/mark-hamill-feared-wrath-of-angry-geek-mobs-if-he-rejected-star-wars-return-force-awakens/
  30. http://www.ibtimes.com/united-airlines-kicks-computer-expert-flight-tweets-1887956
  31. http://www.wsj.com/articles/your-weakest-security-link-your-children-1429499471
  32. http://www.esecurityplanet.com/network-security/researcher-uncovers-match.com-security-flaw.html
  33. http://venturebeat.com/2015/03/25/study-half-of-app-makers-spend-0-on-security/
  34. thehackernews.com/2015/04/smb-windows-vulnerability.html
  35. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  36. http://www.tripwire.com/state-of-security/latest-security-news/sony-hackers-used-phishing-emails-to-breach-company-networks/
  37. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  38. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  39. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  40. Right now panel, it is time for you to answer some questions about this month's news.We'll start with Swift on Security...
  41. From TheNEXUS Community Project and RSA Conference 2015, this is "Wait wait... don't pwn me!", the DevOps and Security news quizz. I am legendary anchor man, <your name>, and here is your host at the Viewing Room in Moscone Center in downtown San Francisco... Mark Miller!