SlideShare a Scribd company logo
2014 Online Trust Audit 
How Does Your Site Rank? 
Audit of the Top 500 Ecommerce 
Sites 
Craig Spiezle 
Executive Director & President, OTA
Honor Roll Overview 
Objective: Move from a “compliance” 
mindset to “stewardship” 
 Recognize leadership brands, sites & apps that implement security and privacy 
practices protecting users’ data 
 Incentivize businesses and developers to enhance their security, data 
protection and privacy practices 
 Make security & privacy part of a brand’s value proposition 
 Increase awareness and preference for best practices 
© 2014 All rights reserved. Online Trust Alliance (OTA)
Honor Roll Overview 
Brand 
Protection 
Security Privacy 
• Analysis of ~800 web sites 
▫ FDIC Banking 100 
▫ Internet Retailer 500 
▫ Top 50 Social 
▫ Top 50 News/Media (introduced in 2014) 
▫ Top 50 Federal Gov’t 
▫ OTA Members 
• Scoring 
▫ Up to 100 points in each category 
▫ Bonus points for emerging practices 
▫ Penalty points for 
 Data loss incident 
 Fines/settlement 
 Failure to follow established practices 
▫ Honor Roll = 80% of total points, 55% or better in each category
Internet Retailer Top 10
Lowlights
Brand Protection 
• Base points 
▫ Email authentication 
 SPF and DKIM at top-level 
and subdomains 
▫ DMARC record and policy (increased 
weight in 2014) 
• Penalty points 
▫ Domain locking (penalty if 
not locked) 
Brand 
Protection 
Security Privacy
© 2014 All rights reserved. Online Trust Alliance (OTA)
© 2014. All rights reserved. Online Trust Alliance (OTA)
Infrastructure Security 
• Base points 
▫ Server & SSL implementation 
• Bonus points 
▫ EV SSL 
▫ AOSSL 
▫ DNSSEC 
• Penalty points 
▫ XSS / iFrame vulnerabilities 
▫ Malware 
▫ Malicious links 
Brand 
Protection 
Security Privacy
Server Configuration Analysis 
Common Issues 
• Support of TLS 2.0 
• “Beast Attack” 
• Mismatched certs 
• Cross site scripting 
• iframes exploits 
Data Sources: SSL Labs - https://www.ssllabs.com & High-Tech Bridge https://www.htbridge.com/ 
© 2014. All rights reserved. Online Trust Alliance (OTA)
SSL Configuration 
© 2014. All rights reserved. Online Trust Alliance (OTA)
© 2014. All rights reserved. Online Trust Alliance (OTA)
Enhanced SSL Criteria 
Two new grades, A+ (100 pts) and A- (90 pts), allow for finer grading. 
Support for TLS 1.2 required for an A. If not, grade is capped at B. 
Key lengths below 2048-bit capped at B (below 1024-bit receive an F) 
MD5 certificate signatures considered insecure, receive an F 
Warnings – servers with good configuration, but one or more warnings, are 
reduced to an A- 
– Servers not supporting Forward Secrecy receive a warning 
– Servers that do not support secure renegotiation receive a warning 
– Servers that use RC4 with TLS 1.1 or TLS 1.2 receive a warning 
© 2014. All rights reserved. Online Trust Alliance (OTA)
Privacy 
• Base points 
▫ Privacy policy 
▫ Third-party trackers on site 
• Bonus points 
▫ Layered privacy policies 
▫ Bilingual policies 
▫ Do Not Track status, policy 
▫ Use of tag management or privacy 
solution 
• Penalty points 
▫ WHOIS (if Private vs Public) 
▫ Data Breach Incidents 
▫ FTC / State Settlements 
Brand 
Protection 
Security Privacy 
Italics = new in 2014
Privacy Highlights
Privacy – Bonus Points 
Layered Notice 
i.e. Publishers Clearing House 
http://privacy.pch.com/ 
Reduced word count from 
over 4,000 words to 475! 
Adds clarity, readability & 
transparency
Call To Action 
• Continually monitoring 
• Email authentication 
• Both SPF & DKIM & DMARC 
• Monitoring your server configuration 
• Privacy policy and practices for alignment 
• Scan all third party ads and content 
© 2014. All rights reserved. Online Trust Alliance (OTA)
Tools & Resources 
• Online Trust Honor Roll https://otalliance.org/HonorRoll 
• Mobile Best Practices 
https://otalliance.org/resources/mobile.html 
• 2014 Data Protection & Breach Readiness Guide 
https://otalliance.org/Breach.html 
• Email Security https://otalliance.org/auth.html 
• Always On SSL SSL Best Practices https://otalliance.org/resources/always-ssl- 
aossl 
• Malvertising / Ad Integrity 
https://otalliance.org/AdIntegrity 
Craig Spiezle craigs@otalliance.org +1 425-455-7400

More Related Content

What's hot

AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
Amazon Web Services
 
Application Resiliency
Application ResiliencyApplication Resiliency
Application Resiliency
Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 
AWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation WorkshopAWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation Workshop
Amazon Web Services
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
Amazon Web Services
 
Asvs v4 developers and founders
Asvs v4 developers and foundersAsvs v4 developers and founders
Asvs v4 developers and founders
Hemed Gur Ary
 
MDaemon Spam Filter Recommended Settings
MDaemon Spam Filter Recommended SettingsMDaemon Spam Filter Recommended Settings
MDaemon Spam Filter Recommended Settings
Alt-N Technologies
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom Presentation
Alert Logic
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
Amazon Web Services
 
Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecurityAmazon Web Services
 

What's hot (11)

AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
 
Application Resiliency
Application ResiliencyApplication Resiliency
Application Resiliency
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
AWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation WorkshopAWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation Workshop
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Asvs v4 developers and founders
Asvs v4 developers and foundersAsvs v4 developers and founders
Asvs v4 developers and founders
 
MDaemon Spam Filter Recommended Settings
MDaemon Spam Filter Recommended SettingsMDaemon Spam Filter Recommended Settings
MDaemon Spam Filter Recommended Settings
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom Presentation
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation Security
 

Viewers also liked

Cloud Based Content Services
Cloud Based Content ServicesCloud Based Content Services
Cloud Based Content Services
Cédric Hüsler
 
BMO jaarvergadering 2013
BMO jaarvergadering 2013BMO jaarvergadering 2013
BMO jaarvergadering 2013
Remco Bron
 
App Safari for Weddingplanners
App Safari for WeddingplannersApp Safari for Weddingplanners
App Safari for Weddingplanners
Remco Bron
 
MACPA 2013 Innovation Summit - Press Conference
MACPA 2013 Innovation Summit - Press ConferenceMACPA 2013 Innovation Summit - Press Conference
MACPA 2013 Innovation Summit - Press Conference
Tom Hood, CPA,CITP,CGMA
 
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż www
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż wwwKuba Marchwicki - Speechstorm - Usability w mediach innych niż www
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż www3camp
 
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesuVirtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
3camp
 

Viewers also liked (7)

Cloud Based Content Services
Cloud Based Content ServicesCloud Based Content Services
Cloud Based Content Services
 
BMO jaarvergadering 2013
BMO jaarvergadering 2013BMO jaarvergadering 2013
BMO jaarvergadering 2013
 
App Safari for Weddingplanners
App Safari for WeddingplannersApp Safari for Weddingplanners
App Safari for Weddingplanners
 
IF-MAP protocol
IF-MAP protocolIF-MAP protocol
IF-MAP protocol
 
MACPA 2013 Innovation Summit - Press Conference
MACPA 2013 Innovation Summit - Press ConferenceMACPA 2013 Innovation Summit - Press Conference
MACPA 2013 Innovation Summit - Press Conference
 
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż www
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż wwwKuba Marchwicki - Speechstorm - Usability w mediach innych niż www
Kuba Marchwicki - Speechstorm - Usability w mediach innych niż www
 
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesuVirtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
Virtual Recruiter – zwycięzca Startup Weekend Trójmiasto. Od pomysłu do biznesu
 

Similar to Craig Spiezle - How Does Your Site Rank? Audit of the Top 500 Ecommerce Sites

Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!
CASCouncil
 
Digital Certificates @ ResellerClub
Digital Certificates @ ResellerClubDigital Certificates @ ResellerClub
Digital Certificates @ ResellerClub
ResellerClub
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Benedek Menesi
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
panagenda
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
Symantec Website Security
 
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
Meghan Weinreich
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
Jim Kaplan CIA CFE
 
Secure Socket Layer SSL Certificate.pptx
Secure Socket Layer SSL Certificate.pptxSecure Socket Layer SSL Certificate.pptx
Secure Socket Layer SSL Certificate.pptx
AnsarHasas1
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
devbhargav1
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
GlobalSign
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
Microsoft TechNet - Belgium and Luxembourg
 
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 release
Devendra Sawant
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Introduction to WebRTC on the Force.com Platform
Introduction to WebRTC on the Force.com PlatformIntroduction to WebRTC on the Force.com Platform
Introduction to WebRTC on the Force.com Platform
Salesforce Developers
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
Imperva
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Adwebtech ssl presentation_beyond_https
Adwebtech ssl presentation_beyond_httpsAdwebtech ssl presentation_beyond_https
Adwebtech ssl presentation_beyond_https
Anju Gigoo
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
Joseph Holbrook, Chief Learning Officer (CLO)
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 

Similar to Craig Spiezle - How Does Your Site Rank? Audit of the Top 500 Ecommerce Sites (20)

Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!
 
Digital Certificates @ ResellerClub
Digital Certificates @ ResellerClubDigital Certificates @ ResellerClub
Digital Certificates @ ResellerClub
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
 
Secure Socket Layer SSL Certificate.pptx
Secure Socket Layer SSL Certificate.pptxSecure Socket Layer SSL Certificate.pptx
Secure Socket Layer SSL Certificate.pptx
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 release
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Introduction to WebRTC on the Force.com Platform
Introduction to WebRTC on the Force.com PlatformIntroduction to WebRTC on the Force.com Platform
Introduction to WebRTC on the Force.com Platform
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Adwebtech ssl presentation_beyond_https
Adwebtech ssl presentation_beyond_httpsAdwebtech ssl presentation_beyond_https
Adwebtech ssl presentation_beyond_https
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Craig Spiezle - How Does Your Site Rank? Audit of the Top 500 Ecommerce Sites

  • 1.
  • 2. 2014 Online Trust Audit How Does Your Site Rank? Audit of the Top 500 Ecommerce Sites Craig Spiezle Executive Director & President, OTA
  • 3. Honor Roll Overview Objective: Move from a “compliance” mindset to “stewardship”  Recognize leadership brands, sites & apps that implement security and privacy practices protecting users’ data  Incentivize businesses and developers to enhance their security, data protection and privacy practices  Make security & privacy part of a brand’s value proposition  Increase awareness and preference for best practices © 2014 All rights reserved. Online Trust Alliance (OTA)
  • 4. Honor Roll Overview Brand Protection Security Privacy • Analysis of ~800 web sites ▫ FDIC Banking 100 ▫ Internet Retailer 500 ▫ Top 50 Social ▫ Top 50 News/Media (introduced in 2014) ▫ Top 50 Federal Gov’t ▫ OTA Members • Scoring ▫ Up to 100 points in each category ▫ Bonus points for emerging practices ▫ Penalty points for  Data loss incident  Fines/settlement  Failure to follow established practices ▫ Honor Roll = 80% of total points, 55% or better in each category
  • 5.
  • 6.
  • 7.
  • 9.
  • 11. Brand Protection • Base points ▫ Email authentication  SPF and DKIM at top-level and subdomains ▫ DMARC record and policy (increased weight in 2014) • Penalty points ▫ Domain locking (penalty if not locked) Brand Protection Security Privacy
  • 12. © 2014 All rights reserved. Online Trust Alliance (OTA)
  • 13. © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 14. Infrastructure Security • Base points ▫ Server & SSL implementation • Bonus points ▫ EV SSL ▫ AOSSL ▫ DNSSEC • Penalty points ▫ XSS / iFrame vulnerabilities ▫ Malware ▫ Malicious links Brand Protection Security Privacy
  • 15. Server Configuration Analysis Common Issues • Support of TLS 2.0 • “Beast Attack” • Mismatched certs • Cross site scripting • iframes exploits Data Sources: SSL Labs - https://www.ssllabs.com & High-Tech Bridge https://www.htbridge.com/ © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 16.
  • 17.
  • 18.
  • 19. SSL Configuration © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 20. © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 21. Enhanced SSL Criteria Two new grades, A+ (100 pts) and A- (90 pts), allow for finer grading. Support for TLS 1.2 required for an A. If not, grade is capped at B. Key lengths below 2048-bit capped at B (below 1024-bit receive an F) MD5 certificate signatures considered insecure, receive an F Warnings – servers with good configuration, but one or more warnings, are reduced to an A- – Servers not supporting Forward Secrecy receive a warning – Servers that do not support secure renegotiation receive a warning – Servers that use RC4 with TLS 1.1 or TLS 1.2 receive a warning © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 22.
  • 23.
  • 24. Privacy • Base points ▫ Privacy policy ▫ Third-party trackers on site • Bonus points ▫ Layered privacy policies ▫ Bilingual policies ▫ Do Not Track status, policy ▫ Use of tag management or privacy solution • Penalty points ▫ WHOIS (if Private vs Public) ▫ Data Breach Incidents ▫ FTC / State Settlements Brand Protection Security Privacy Italics = new in 2014
  • 26. Privacy – Bonus Points Layered Notice i.e. Publishers Clearing House http://privacy.pch.com/ Reduced word count from over 4,000 words to 475! Adds clarity, readability & transparency
  • 27. Call To Action • Continually monitoring • Email authentication • Both SPF & DKIM & DMARC • Monitoring your server configuration • Privacy policy and practices for alignment • Scan all third party ads and content © 2014. All rights reserved. Online Trust Alliance (OTA)
  • 28. Tools & Resources • Online Trust Honor Roll https://otalliance.org/HonorRoll • Mobile Best Practices https://otalliance.org/resources/mobile.html • 2014 Data Protection & Breach Readiness Guide https://otalliance.org/Breach.html • Email Security https://otalliance.org/auth.html • Always On SSL SSL Best Practices https://otalliance.org/resources/always-ssl- aossl • Malvertising / Ad Integrity https://otalliance.org/AdIntegrity Craig Spiezle craigs@otalliance.org +1 425-455-7400

Editor's Notes

  1. Includes 11 due to ties Ranged from #4 ranked Walmart to #476 Books-A-Million