SlideShare a Scribd company logo
1 of 78
#DontPwnMe
Wait! Wait! Don’t pwn me!
The Security News Game Show
#DontPwnMe
#DontPwnMe
@TSWAlliance
#DontPwnMe
The Rules
• Each correct answer to the initial question is
worth 3 points
• A wrong answer subtracts 2 points
• A pass on a question loses 1 point
• A correct answer from an audience member
gets allocated 2 points to the panelist of their
choice
#DontPwnMe
The moderator may arbitrarily
give or take away points at any time
The Rules
#DontPwnMe
We need a volunteer to keep score.
The Rules
#DontPwnMe
To get a copy of the slides
immediately…
mmiller@sonatype.com
#DontPwnMe
Online News Resources
#DontPwnMe
#DontPwnMe
Researchers have found a way to take
down the power grid through something
in your home. What is it?
#DontPwnMe
#DontPwnMe
On February 5, 2016, a UN Working
Group on Arbitrary Retention declared a
specific internet celebrity is being held
illegally. Who is it?
#DontPwnMe
#DontPwnMe
What should you do to keep the NSA
Hacker Chief out of your system?
#DontPwnMe
#DontPwnMe
At the Enigma Security Conference in San
Francisco, Nicholas Weaver talked about a
system that could do what?
(Hint: It competes on a miniature scale
with a three letter agency.)
#DontPwnMe
#DontPwnMe
Two power distribution companies in
what country said hackers had hijacked
their systems to cut power to more than
80,000 people.
#DontPwnMe
#DontPwnMe
Name one of the top five biggest security
threats of 2016 according to Wired.
#DontPwnMe
• Extortion Hacks
• Attacks that change or manipulate data
• Chip-and-Pin Innovations
• The Rise of the IoT Zombie Botnet
• More Backdoors
#DontPwnMe
Name one of the five comics you
must read before seeing DeadPool.
#DontPwnMe
Deadpool Vol. 3 #1-33 (1997-1999)
Cable & Deadpool #1-6 (2004)
Deadpool Max #1-12 (2010-2011)
Uncanny X-Force Vol. 1 #25-35 (2011-2012)
Deadpool Vol. 5 #13-19 (2013)
#DontPwnMe
#DontPwnMe
Valentine’s Day saw major hacks against
which, major merchant group?
#DontPwnMe
#DontPwnMe
“Man Admits To Laundering $19.6 Million
in Hacking, Telecom Fraud Scam”. What
did he do?
#DontPwnMe
#DontPwnMe
What health care company had the
largest breach of 2015, exposing the
personal data of over 80,000,000
patients?
#DontPwnMe
#DontPwnMe
According to James Clapper, US Director
of National Intelligence, this is the next
surveillance frontier.
#DontPwnMe
#DontPwnMe
#DontPwnMe
Which of the major movie stream
providers got called out by Symantec for
malware, scams and phishing schemes?
Amazon Prime Video
Netflix
Hulu
#DontPwnMe
#DontPwnMe
Which non-browser based application
was hit with the latest malvertising scam?
#DontPwnMe
#DontPwnMe
What percentage of mobile apps have at
least one high security risk flaw?
#DontPwnMe
#DontPwnMe
#DontPwnMe
What percentage of ID theft can be
attributed to tax refund fraud?
23%
34%
47%
#DontPwnMe
#DontPwnMe
Oracle confirmed it’s next major release
of Java will no longer do what?
• Completely hose your browser during
an important live meeting
• Plug directly into your browser
• Be compatible with Windows 7 or less
• Call home to Oracle with no notice
#DontPwnMe
#DontPwnMe
What major grocery chain got hacked
with skimmers at the self-service
checkout kiosks?
• Safeway
• Piggly Wiggly
• Albersons
#DontPwnMe
#DontPwnMe
ComfortLink thermostats come with a
“interesting” hole in their security. What
is it?
• Hardcoded passwords
• Cross-frequency interference to your
local wireless network
• All devices have the same default
password
#DontPwnMe
#DontPwnMe
How are fraudsters tapping Kohl’s for cash
through the “Kohl’s Cash” program?
#DontPwnMe
#DontPwnMe
#DontPwnMe
Women are considered better coders… if
they do this one, specific thing.
#DontPwnMe
#DontPwnMe
What’s the most nonsensical way to brick
your iPhone, iPad or iPad touch?
• Pinch photos so small, machine
crashes and won’t reboot
• Set the date to 1 January 1970
• Connect to an unknown service to
download a “patch”
#DontPwnMe
#DontPwnMe
“Error 53” on an iPhone 6 has a lot of
people pissed off. What does it do?
#DontPwnMe
#DontPwnMe
#DontPwnMe
After the announcement of WebSense
being acquired by Ratheon, what did
scammers send as email to WebSense
employees?
#DontPwnMe
#DontPwnMe
PhishMe just raised $13 million in
funding. What do they do?
#DontPwnMe
#DontPwnMe
Name one of the top three phishing
trends for 2016.
#DontPwnMe
Trend 1: Consolidation of Targets
Trend 2: Explosive Chinese Phishing Growth
Trend 3: Plunging Phishing Uptimes
#DontPwnMe
#DontPwnMe
Disney recently requested to be able to
fly drones in their own amusement parks.
What snag did they hit?
#DontPwnMe
#DontPwnMe
What happened when a Chinese TV
station replaced its meteorologist with a
chatbot?
#DontPwnMe
#DontPwnMe
Sadly, a computer just beat a master
player at one of the most complex board
games. What game?
#DontPwnMe
#DontPwnMe
Biggest Stories of the Week
#DontPwnMe
Samsung want customers to stop doing
what with their TVs?
#DontPwnMe
#DontPwnMe
Final question:
Hackers are holding what company’s
network hostage for $3.6 million?
#DontPwnMe
#DontPwnMe
What is the final score?
#DontPwnMe
To get a copy of the slides
immediately…
mmiller@sonatype.com
#DontPwnMe
Thank You!

More Related Content

Viewers also liked

08. juknis analisis l lingkungan eksternal satdik 2411
08. juknis analisis l lingkungan eksternal satdik 241108. juknis analisis l lingkungan eksternal satdik 2411
08. juknis analisis l lingkungan eksternal satdik 2411Suaidin -Dompu
 
Thailand travel advice - GOV.UK
Thailand travel advice - GOV.UKThailand travel advice - GOV.UK
Thailand travel advice - GOV.UKyummyeconomy508
 
Using amazon machine learning to identify trends in io t data technical 201
Using amazon machine learning to identify trends in io t data   technical 201Using amazon machine learning to identify trends in io t data   technical 201
Using amazon machine learning to identify trends in io t data technical 201Amazon Web Services
 
Jithan bridgmohan's resume v1
Jithan bridgmohan's resume v1Jithan bridgmohan's resume v1
Jithan bridgmohan's resume v1Jithan Bridgmohan
 
Rosa samaniego jarionga laberinto
Rosa samaniego  jarionga laberintoRosa samaniego  jarionga laberinto
Rosa samaniego jarionga laberintorosalisbeth1997
 
Christian Mueller ABIO 399 paper 12 16 15
Christian Mueller ABIO 399 paper 12 16 15Christian Mueller ABIO 399 paper 12 16 15
Christian Mueller ABIO 399 paper 12 16 15Christian Mueller
 

Viewers also liked (8)

08. juknis analisis l lingkungan eksternal satdik 2411
08. juknis analisis l lingkungan eksternal satdik 241108. juknis analisis l lingkungan eksternal satdik 2411
08. juknis analisis l lingkungan eksternal satdik 2411
 
Thailand travel advice - GOV.UK
Thailand travel advice - GOV.UKThailand travel advice - GOV.UK
Thailand travel advice - GOV.UK
 
Using amazon machine learning to identify trends in io t data technical 201
Using amazon machine learning to identify trends in io t data   technical 201Using amazon machine learning to identify trends in io t data   technical 201
Using amazon machine learning to identify trends in io t data technical 201
 
Jithan bridgmohan's resume v1
Jithan bridgmohan's resume v1Jithan bridgmohan's resume v1
Jithan bridgmohan's resume v1
 
Rosa samaniego jarionga laberinto
Rosa samaniego  jarionga laberintoRosa samaniego  jarionga laberinto
Rosa samaniego jarionga laberinto
 
NEA Innovation Physics - Part 1
NEA Innovation Physics - Part 1NEA Innovation Physics - Part 1
NEA Innovation Physics - Part 1
 
Christian Mueller ABIO 399 paper 12 16 15
Christian Mueller ABIO 399 paper 12 16 15Christian Mueller ABIO 399 paper 12 16 15
Christian Mueller ABIO 399 paper 12 16 15
 
lee parte I
lee parte Ilee parte I
lee parte I
 

Similar to DevNexus 2016: Wait! Wait! Don't pwn me!

2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!Mark Miller
 
Who is the Greatest Double-Oh from an HR Perspective?
Who is the Greatest Double-Oh from an HR Perspective?Who is the Greatest Double-Oh from an HR Perspective?
Who is the Greatest Double-Oh from an HR Perspective?Human Capital Media
 
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!SeniorStoryteller
 
Communicating in the virtual world
Communicating in the virtual worldCommunicating in the virtual world
Communicating in the virtual worldlarssudmann
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsHeather Vescent
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Game Over or Game Changing? Why Software Development May Never be the same again
Game Over or Game Changing? Why Software Development May Never be the same againGame Over or Game Changing? Why Software Development May Never be the same again
Game Over or Game Changing? Why Software Development May Never be the same againSteve Poole
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014protected7000
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
 
Designing Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralityDesigning Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralitySerge Versille
 
Designing Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralityDesigning Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralityPretty Simple
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaDeSmart Agile Software House
 
Digital Fundamentals: 10 things you need to know to develop a great digital s...
Digital Fundamentals: 10 things you need to know to develop a great digital s...Digital Fundamentals: 10 things you need to know to develop a great digital s...
Digital Fundamentals: 10 things you need to know to develop a great digital s...Gary Bembridge
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyAlisa Alvich
 
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextGIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextSteve Poole
 
16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent WildfireSean Moffitt
 
DevnexusRansomeware.pptx
DevnexusRansomeware.pptxDevnexusRansomeware.pptx
DevnexusRansomeware.pptxSteve Poole
 

Similar to DevNexus 2016: Wait! Wait! Don't pwn me! (20)

2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
 
Who is the Greatest Double-Oh from an HR Perspective?
Who is the Greatest Double-Oh from an HR Perspective?Who is the Greatest Double-Oh from an HR Perspective?
Who is the Greatest Double-Oh from an HR Perspective?
 
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
 
Communicating in the virtual world
Communicating in the virtual worldCommunicating in the virtual world
Communicating in the virtual world
 
Intro to social media
Intro to social mediaIntro to social media
Intro to social media
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
Random tech
Random techRandom tech
Random tech
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Game Over or Game Changing? Why Software Development May Never be the same again
Game Over or Game Changing? Why Software Development May Never be the same againGame Over or Game Changing? Why Software Development May Never be the same again
Game Over or Game Changing? Why Software Development May Never be the same again
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020
 
Designing Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralityDesigning Criminal Case for Retention and Virality
Designing Criminal Case for Retention and Virality
 
Designing Criminal Case for Retention and Virality
Designing Criminal Case for Retention and ViralityDesigning Criminal Case for Retention and Virality
Designing Criminal Case for Retention and Virality
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
 
Digital Fundamentals: 10 things you need to know to develop a great digital s...
Digital Fundamentals: 10 things you need to know to develop a great digital s...Digital Fundamentals: 10 things you need to know to develop a great digital s...
Digital Fundamentals: 10 things you need to know to develop a great digital s...
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextGIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
 
16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire
 
DevnexusRansomeware.pptx
DevnexusRansomeware.pptxDevnexusRansomeware.pptx
DevnexusRansomeware.pptx
 

More from SeniorStoryteller

Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...SeniorStoryteller
 
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanWhere Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanSeniorStoryteller
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenSeniorStoryteller
 
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel DiscussionScaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel DiscussionSeniorStoryteller
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybSeniorStoryteller
 
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...SeniorStoryteller
 
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul ReedRelease Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul ReedSeniorStoryteller
 
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...SeniorStoryteller
 
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsOps Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsSeniorStoryteller
 
Building Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh RaghavanBuilding Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh RaghavanSeniorStoryteller
 
Breaking Bad Equilibruim - John Willis
Breaking Bad Equilibruim - John WillisBreaking Bad Equilibruim - John Willis
Breaking Bad Equilibruim - John WillisSeniorStoryteller
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
NuGet Package Management Done Right
NuGet Package Management Done RightNuGet Package Management Done Right
NuGet Package Management Done RightSeniorStoryteller
 
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerHero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerSeniorStoryteller
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzSeniorStoryteller
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySeniorStoryteller
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSoftware Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSeniorStoryteller
 
Heroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsHeroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsSeniorStoryteller
 
Rugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessRugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessSeniorStoryteller
 
Create Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainCreate Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainSeniorStoryteller
 

More from SeniorStoryteller (20)

Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua CormanWhere Bits & Bytes Meet Flesh and Blood - Joshua Corman
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ Schleen
 
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel DiscussionScaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
 
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul ReedRelease Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
 
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
 
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsOps Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon Edwards
 
Building Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh RaghavanBuilding Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh Raghavan
 
Breaking Bad Equilibruim - John Willis
Breaking Bad Equilibruim - John WillisBreaking Bad Equilibruim - John Willis
Breaking Bad Equilibruim - John Willis
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
NuGet Package Management Done Right
NuGet Package Management Done RightNuGet Package Management Done Right
NuGet Package Management Done Right
 
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and DockerHero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSoftware Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
 
Heroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsHeroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps Transformations
 
Rugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for SuccessRugged DevOps: Aligning Your Team and Your Powers for Success
Rugged DevOps: Aligning Your Team and Your Powers for Success
 
Create Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply ChainCreate Rugged Applications: Managing Your Software Supply Chain
Create Rugged Applications: Managing Your Software Supply Chain
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

DevNexus 2016: Wait! Wait! Don't pwn me!

Editor's Notes

  1. http://www.wired.com/2016/02/how-to-hack-the-power-grid-through-home-air-conditioners/
  2. http://www.wired.com/2016/02/julian-assanges-3-5-year-detainment-in-embassy-ruled-unlawful/
  3. http://www.wired.com/2016/01/nsa-hacker-chief-explains-how-to-keep-him-out-of-your-system/
  4. http://www.wired.com/2016/01/how-to-make-your-own-nsa-bulk-surveillance-system/
  5. http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/
  6. http://www.wired.com/2016/01/the-biggest-security-threats-well-face-in-2016/
  7. http://www.wired.com/2016/02/deadpool-reading-list/
  8. http://www.darkreading.com/endpoint/valentines-day-inspires-ddos-attacks-against-online-florists-/d/d-id/1324312?
  9. http://www.darkreading.com/attacks-breaches/man-admits-to-laundering-$196-million-in-hacking-telecom-fraud-scam/d/d-id/1324296?ngAction=register#
  10. http://www.darkreading.com/endpoint/the-phishie-awards-(dis)honoring-the-best-of-the-worst-phishing-attacks-/d/d-id/1324135?
  11. http://www.informationweek.com/government/iot-next-surveillance-frontier-says-us-spy-chief/d/d-id/1324261
  12. http://www.infosecurity-magazine.com/news/symantec-warns-of-netflix-malware/
  13. http://www.infosecurity-magazine.com/news/skype-hit-in-latest-malvertising/
  14. http://www.infosecurity-magazine.com/news/leaky-mobile-apps-expose-personal/
  15. http://krebsonsecurity.com/2016/01/ftc-tax-fraud-behind-47-spike-in-id-theft/
  16. http://krebsonsecurity.com/2016/02/good-riddance-to-oracles-java-plugin/
  17. http://krebsonsecurity.com/2016/02/safeway-self-checkout-skimmer-close-up/
  18. http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/
  19. http://krebsonsecurity.com/2016/02/fraudsters-tap-kohls-cash-for-cold-cash/
  20. http://www.theguardian.com/technology/2016/feb/12/women-considered-better-coders-hide-gender-github
  21. http://www.theguardian.com/technology/2016/feb/12/setting-the-date-to-1-january-1970-will-brick-your-iphone-ipad-or-ipod-touch
  22. http://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair
  23. http://www.securityweek.com/websense-employees-targeted-fake-raytheon-acquisition-emails
  24. http://www.securityweek.com/phishme-raises-13-million
  25. http://www.securityweek.com/looking-top-three-global-phishing-trends
  26. https://www.washingtonpost.com/news/innovations/wp/2016/01/22/disney-loved-its-no-fly-zone-until-it-wanted-to-fly-its-own-drones/
  27. https://www.washingtonpost.com/news/innovations/wp/2016/01/12/a-chinese-tv-station-replaced-its-weatherman-with-a-chatbot-and-people-liked-it/
  28. http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs
  29. http://www.theverge.com/2016/2/15/11004794/california-ransomware-hospital