Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing the Insecure

979 views

Published on

Securing the Insecure - WSO2Con 2014 USA

Published in: Engineering
  • Be the first to comment

Securing the Insecure

  1. 1. Securing the Insecure Prabath Siriwardena Director of Security Architecture WSO2
  2. 2. Perception
  3. 3. Perception
  4. 4. Perception
  5. 5. Perception
  6. 6. Correctness
  7. 7. C-I-A C-I-A Confidentiality Integrity Availability
  8. 8. Attacks : RSA – March, 2011
  9. 9. Attacks : Adobe – October, 2013
  10. 10. Attacks : Target – November, 2013
  11. 11. The Weakest Link: Monoprix, France
  12. 12. The Defense in Depth: Los Angeles Airport
  13. 13. Insider Attacks: WikiLeaks, NSA
  14. 14. Insider Attacks: Cyber Insider Threat (CINDER)
  15. 15. Security by Obscurity: Microsoft NTLM
  16. 16. Software Security: Code is the Focus
  17. 17. Operating System Security
  18. 18. Firewalls and IDS
  19. 19. Heartbleed
  20. 20. Threat Modeling
  21. 21. Thank You

×