Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
information

SECURITY
for creative folks
Paul Schreiberpaulschreiber@gmail.com
@paulschreiber
tradeoffs
continuum
average people✔
under government surveillance
whistleblowers
political campaigners
activists
celebrities
victims of stalking and violence
corporate espionage
criminal gangs
zero-day exploits
Mossad, CIA, MI6, NSA
password reuse✔
password guessing✔
lost and stolen devices✔
phishing✔
threat
model
how much they want to know
howmuchyoucare
$$$$$$
0 $
assets
adversaries
capabilities
consequences
defenses
memorizing
passwords
password
managers
Create View Edit Delete Web Sync 2FA Mac Windows Linux iOS Android
Chrome ✔ ✔ ✘ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Firefox ✘ ✔ ✔ ✔ ✘ ✔ ✘ ✔ ...
Preferences > Passwords
chrome://flags
chrome://settings/passwords
about:preferences#privacy
security
questions
“security”
questions
password
sharing
password
resets
know
are
have
Many graphics from The Noun Project

Bear by Gan Khoon Lay; C Computer by Azis; Credit card Gonzalo Bravo;
Fingerprint by ...
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
What to Upload to SlideShare
Next
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

Share

CreativeMornings FieldTrip: information security for creative folks

Download to read offline

Lots of important information is on your computer and in the cloud. Keeping it private and secure is really important.

Security doesn’t have to be overwhelming and scary!

In this hands-on session, you’ll learn about what’s important and what’s not, risk assessment (security folks call this “threat modeling”), and we’ll help you set up good password practices, two-factor authentication and use a security key.


https://creativemornings.com/talks/information-security-for-creative-folks

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

CreativeMornings FieldTrip: information security for creative folks

  1. 1. information SECURITY for creative folks
  2. 2. Paul Schreiberpaulschreiber@gmail.com @paulschreiber
  3. 3. tradeoffs
  4. 4. continuum
  5. 5. average people✔
  6. 6. under government surveillance whistleblowers political campaigners activists celebrities victims of stalking and violence
  7. 7. corporate espionage criminal gangs zero-day exploits Mossad, CIA, MI6, NSA
  8. 8. password reuse✔ password guessing✔ lost and stolen devices✔ phishing✔
  9. 9. threat model
  10. 10. how much they want to know howmuchyoucare $$$$$$ 0 $
  11. 11. assets
  12. 12. adversaries
  13. 13. capabilities
  14. 14. consequences
  15. 15. defenses
  16. 16. memorizing passwords
  17. 17. password managers
  18. 18. Create View Edit Delete Web Sync 2FA Mac Windows Linux iOS Android Chrome ✔ ✔ ✘ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Firefox ✘ ✔ ✔ ✔ ✘ ✔ ✘ ✔ ✔ ✔ ✔ ✔ Safari ✔ ✔ ✔ ✔ ✘ ✔ ✔ ✔ ✘ ✘ ✔ ✘ browser password management
  19. 19. Preferences > Passwords
  20. 20. chrome://flags
  21. 21. chrome://settings/passwords
  22. 22. about:preferences#privacy
  23. 23. security questions
  24. 24. “security” questions
  25. 25. password sharing
  26. 26. password resets
  27. 27. know
  28. 28. are
  29. 29. have
  30. 30. Many graphics from The Noun Project Bear by Gan Khoon Lay; C Computer by Azis; Credit card Gonzalo Bravo; Fingerprint by Ben Davis; Lock with keyhole by Brennan Novak; Marker by Jeff Seevers; Nokia 3310 by Stan Fisher; Notification by vijay sekhar; Shield by Wayne Thayer; Spy by Alen Krummenacher.

Lots of important information is on your computer and in the cloud. Keeping it private and secure is really important. Security doesn’t have to be overwhelming and scary! In this hands-on session, you’ll learn about what’s important and what’s not, risk assessment (security folks call this “threat modeling”), and we’ll help you set up good password practices, two-factor authentication and use a security key. https://creativemornings.com/talks/information-security-for-creative-folks

Views

Total views

146

On Slideshare

0

From embeds

0

Number of embeds

0

Actions

Downloads

0

Shares

0

Comments

0

Likes

0

×