Community Emergency Response Network. $GUARD Token. Guardian Circle App. Deliver Feb 17 in Seattle at NeoDevCon2019. #SmartCities. Video of presentation [15 mins]: https://youtu.be/nao0bIXJTrY?t=20073
Guardian Circle $GUARD Presentation - NeoDevCon 2019Mark Jeffrey
Community Emergency Response Network. $GUARD Token. Guardian Circle App. Deliver Feb 17 in Seattle at NeoDevCon2019. #SmartCities. Video of presentation [15 mins]: https://youtu.be/nao0bIXJTrY?t=2007
GUARDIUM Token: Global Decentralized Emergency Response (911)Mark Jeffrey
GUARDIUM In A Nutshell: We are creating a new worldwide 9-1-1 grid based on blockchain technology.
Infinite Alerting: An API lets myriad devices generate an Alert (Apps, Alexa voice, in-car, smart watches, jewelry panic buttons, fall detection, irregular heartrate detection, etc.)
Infinite Response: A blockchain / crypto is used to flash organize vetted citizen responders and pro responders. EMTs, ex-military, friends, family, neighbors. Think Uber-ized citizen and pro responders, globally.
The emergency grid looks down and sees what people and resources are already nearby and creates a 'flash mob of help'.
Guardian Circle $GUARD Presentation - NeoDevCon 2019Mark Jeffrey
Community Emergency Response Network. $GUARD Token. Guardian Circle App. Deliver Feb 17 in Seattle at NeoDevCon2019. #SmartCities. Video of presentation [15 mins]: https://youtu.be/nao0bIXJTrY?t=2007
GUARDIUM Token: Global Decentralized Emergency Response (911)Mark Jeffrey
GUARDIUM In A Nutshell: We are creating a new worldwide 9-1-1 grid based on blockchain technology.
Infinite Alerting: An API lets myriad devices generate an Alert (Apps, Alexa voice, in-car, smart watches, jewelry panic buttons, fall detection, irregular heartrate detection, etc.)
Infinite Response: A blockchain / crypto is used to flash organize vetted citizen responders and pro responders. EMTs, ex-military, friends, family, neighbors. Think Uber-ized citizen and pro responders, globally.
The emergency grid looks down and sees what people and resources are already nearby and creates a 'flash mob of help'.
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
There are over 100 endpoint security products that claim to stop malware and other attacks against Windows. Nearly every major security incident or breach that has made media headlines had two things in common: Windows running one of these 100 products. This workshop won't spend any time bashing vendors, however. In fact, many of these products can be valuable assets when part of a more comprehensive endpoint protection strategy.
Part one of this workshop will address the anatomy of malware and why it succeeds so often.
The second part will dive down into practical defensive strategies, including passive prevention, detection, response, and remediation.
- Passive prevention is effectively free and ideal
- Prevention will always fail a percentage of the time, so detection is essential
- Response, if practiced and efficient, has a chance of stopping attacks before they reach their goal
- Remediation, because someone has to clean up this mess...
Every successful security strategy includes planning to handle failure quickly and effectively.
The remainder of the workshop will be hands-on.
Part three will review the native defensive capabilities in Windows and the pros/cons associated with using them.
For the finale, brave and trusting attendees will be invited to run neutered malware on the virtual Windows systems provided for this workshop to test out our newfound defensive skills. If not, there's no shame in watching your neighbor infect themselves with ransomware as you take notes.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
A close look at how leveraging backup and recovery principals with Infrascale can help organizations beat ransomware attacks. Very cool technology which also augments DR/BC preparedness.
Presentation at the international conference “PECOS4SMEs – Cross-border e-Commerce for SMEs” by Remo Hardeman.
This project has been funded with support from the European Commission.
This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
AVG (AU/NZ)'s Security Advisor, Michael McKinnon, details the latest emerging threats and trends in online security: toolkits, spam, rogue apps, printed malware, fake anti-virus, ransomware and mobile security.
Presentation for #TFT12: Location and the Future of the Interface
In this presentation, Geoloqi founder Amber Case will highlight why developers of apps should look at what users want to do now, as well as what users want to do in the future, why social apps should try to mirror real-world relationships, why sharing should be about who you share with as well as how long you're sharing, and why developers should think about how to make apps "ambient" and require less user interaction.
See Amber's TFT speaker Pinterest board: http://pinterest.com/servicedesk/amber-case/
Why is it that the more we come to depend on our mobile phones as our lifeline to the the world, the more willingly we give up privacy and control?
Earthmouse: Mobile Guardian (E:MG) aims to change that by providing regular people with the tools they need to protect their privacy, anonymity and communications with friends, family and colleagues.
Built on the Google Android OS, E:MG will provide both applications and a completely new secure distribution that will run on low cost mobile phone hardware available throughout the world.
We are looking for users, developers, causes and partner organizations to contribute to, inform and guide our work.
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsYevgeniy Brikman
"All happy cloud deployments are alike; each unhappy cloud deployment is unhappy in its own way." — Leo Tolstoy, Site Reliability Engineer
At Gruntwork, I've had the chance to see the cloud adoption journeys of hundreds of companies, from tiny startups to Fortune 50 giants. I've seen those journeys go well. I've seen those journeys go poorly. In this talk, I discuss a few of the ways cloud adoption can go horribly wrong (massive cost overruns, endless death marches, security disasters), and more importantly, how you can get it right.
To help you get it right, we looked at the cloud journeys that were successful and extracted from them the patterns they had in common. We distilled all this experience down into something called the Gruntwork Production Framework, which defines five concrete steps you can follow to adopt the cloud at your own company—and hopefully, to end up with your very own happy cloud deployment.
We believe that it is totally possible to collect all the data needed to build and to improve search experience, build a safe browsing environment, and other services that improve the web experience for users, without having to rely on calling back home with the full data from the user.
Slides presented at Network X in Amsterdam on 19th October at the TADHack Takeover session, 1:30-2:30 with DT, hubraum, covering their 5G APIs. Reviewing all the winners from TADHack Global 2022, sponsored by Radisys, STROLID, Jambonz.
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
SaaS and IaaS are new frontiers for a lot of security teams. We'll explore some thoughts at how you might approach some of these areas of your environment from a hunting or IR perspective. This was from a Sans webinar on 2019-09-25.
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
Between limited resources and a lack of trained professionals on one hand and the increasing quantity and quality of attacks on the other, securing enterprises and responding to incidents has placed defenders on the losing end of a digital arms race. Even managing the amounts of threat data and open-source intelligence has become a challenge.
This talk will cover the possibilities and perils of integrating all the various sources of threat intelligence data to protect an organization. With all the various open-source and paid-source data, simply dumping it all into a firewall or DNS RPZ zone can be problematic. What to do about compromised websites or shared hosting environments? What about DGA domains that use full words and may collide with actual innocent websites? What about how to handle threat data that is lacking in context to make appropriate decisions on its validity and accuracy? This talk will present several case studies in how these problems can be tackled and how using multi-domain analysis can help reduce the risk and maximize the value of automated protection using these types of data.
"I haz you and pwn your maal" by Harsimran Walia @b44nz0r at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.html
This talk shows the possibilities of reversing Android applications. After an introduction about Android issues in the past, Tobias Ospelt explains how he managed to download several thousand Android applications from the Google Market, and which security issues are present in various apps. Apps can be decompiled, altered and recompiled, which means that for most apps it is very easy to steal code or to include malware. Some of the apps use obfuscation to disguise the code, but for example encryption keys can easily be extracted. Small game developers, as well as big companies are not aware of the risk that their code can be decompiled to java and disassembled to smali code. This is how a lot of protection mechanisms can be circumvented, such as licensing (cracking a Game) or corporate solutions (enforcing policies on the mobile). The talk shows how easy everybody can reverse android apps and how encryption keys can be extracted, even when the code is obfuscated. The material is a nice follow-up to the Android talk of Jesse Burns from last year at #days, although this talk is more focused on the apps and shows some more hacks/code/encryption/obfuscation/reversing.
Bio: Tobias Ospelt is working as a security expert and tester for Dreamlab Technologies AG in Bern. He is mainly involved in web application and mobile security penetration tests. Tobias Ospelt joined Dreamlab after having achieved his Master Degree focusing IT-Security, and after having worked as a Research Assistant at the Zurich University of Applied Sciences.
More Related Content
Similar to Guardian Circle $GUARD Presentation - NeoDevCon 2019
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
There are over 100 endpoint security products that claim to stop malware and other attacks against Windows. Nearly every major security incident or breach that has made media headlines had two things in common: Windows running one of these 100 products. This workshop won't spend any time bashing vendors, however. In fact, many of these products can be valuable assets when part of a more comprehensive endpoint protection strategy.
Part one of this workshop will address the anatomy of malware and why it succeeds so often.
The second part will dive down into practical defensive strategies, including passive prevention, detection, response, and remediation.
- Passive prevention is effectively free and ideal
- Prevention will always fail a percentage of the time, so detection is essential
- Response, if practiced and efficient, has a chance of stopping attacks before they reach their goal
- Remediation, because someone has to clean up this mess...
Every successful security strategy includes planning to handle failure quickly and effectively.
The remainder of the workshop will be hands-on.
Part three will review the native defensive capabilities in Windows and the pros/cons associated with using them.
For the finale, brave and trusting attendees will be invited to run neutered malware on the virtual Windows systems provided for this workshop to test out our newfound defensive skills. If not, there's no shame in watching your neighbor infect themselves with ransomware as you take notes.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
A close look at how leveraging backup and recovery principals with Infrascale can help organizations beat ransomware attacks. Very cool technology which also augments DR/BC preparedness.
Presentation at the international conference “PECOS4SMEs – Cross-border e-Commerce for SMEs” by Remo Hardeman.
This project has been funded with support from the European Commission.
This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
AVG (AU/NZ)'s Security Advisor, Michael McKinnon, details the latest emerging threats and trends in online security: toolkits, spam, rogue apps, printed malware, fake anti-virus, ransomware and mobile security.
Presentation for #TFT12: Location and the Future of the Interface
In this presentation, Geoloqi founder Amber Case will highlight why developers of apps should look at what users want to do now, as well as what users want to do in the future, why social apps should try to mirror real-world relationships, why sharing should be about who you share with as well as how long you're sharing, and why developers should think about how to make apps "ambient" and require less user interaction.
See Amber's TFT speaker Pinterest board: http://pinterest.com/servicedesk/amber-case/
Why is it that the more we come to depend on our mobile phones as our lifeline to the the world, the more willingly we give up privacy and control?
Earthmouse: Mobile Guardian (E:MG) aims to change that by providing regular people with the tools they need to protect their privacy, anonymity and communications with friends, family and colleagues.
Built on the Google Android OS, E:MG will provide both applications and a completely new secure distribution that will run on low cost mobile phone hardware available throughout the world.
We are looking for users, developers, causes and partner organizations to contribute to, inform and guide our work.
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsYevgeniy Brikman
"All happy cloud deployments are alike; each unhappy cloud deployment is unhappy in its own way." — Leo Tolstoy, Site Reliability Engineer
At Gruntwork, I've had the chance to see the cloud adoption journeys of hundreds of companies, from tiny startups to Fortune 50 giants. I've seen those journeys go well. I've seen those journeys go poorly. In this talk, I discuss a few of the ways cloud adoption can go horribly wrong (massive cost overruns, endless death marches, security disasters), and more importantly, how you can get it right.
To help you get it right, we looked at the cloud journeys that were successful and extracted from them the patterns they had in common. We distilled all this experience down into something called the Gruntwork Production Framework, which defines five concrete steps you can follow to adopt the cloud at your own company—and hopefully, to end up with your very own happy cloud deployment.
We believe that it is totally possible to collect all the data needed to build and to improve search experience, build a safe browsing environment, and other services that improve the web experience for users, without having to rely on calling back home with the full data from the user.
Slides presented at Network X in Amsterdam on 19th October at the TADHack Takeover session, 1:30-2:30 with DT, hubraum, covering their 5G APIs. Reviewing all the winners from TADHack Global 2022, sponsored by Radisys, STROLID, Jambonz.
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
SaaS and IaaS are new frontiers for a lot of security teams. We'll explore some thoughts at how you might approach some of these areas of your environment from a hunting or IR perspective. This was from a Sans webinar on 2019-09-25.
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
Between limited resources and a lack of trained professionals on one hand and the increasing quantity and quality of attacks on the other, securing enterprises and responding to incidents has placed defenders on the losing end of a digital arms race. Even managing the amounts of threat data and open-source intelligence has become a challenge.
This talk will cover the possibilities and perils of integrating all the various sources of threat intelligence data to protect an organization. With all the various open-source and paid-source data, simply dumping it all into a firewall or DNS RPZ zone can be problematic. What to do about compromised websites or shared hosting environments? What about DGA domains that use full words and may collide with actual innocent websites? What about how to handle threat data that is lacking in context to make appropriate decisions on its validity and accuracy? This talk will present several case studies in how these problems can be tackled and how using multi-domain analysis can help reduce the risk and maximize the value of automated protection using these types of data.
"I haz you and pwn your maal" by Harsimran Walia @b44nz0r at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.html
This talk shows the possibilities of reversing Android applications. After an introduction about Android issues in the past, Tobias Ospelt explains how he managed to download several thousand Android applications from the Google Market, and which security issues are present in various apps. Apps can be decompiled, altered and recompiled, which means that for most apps it is very easy to steal code or to include malware. Some of the apps use obfuscation to disguise the code, but for example encryption keys can easily be extracted. Small game developers, as well as big companies are not aware of the risk that their code can be decompiled to java and disassembled to smali code. This is how a lot of protection mechanisms can be circumvented, such as licensing (cracking a Game) or corporate solutions (enforcing policies on the mobile). The talk shows how easy everybody can reverse android apps and how encryption keys can be extracted, even when the code is obfuscated. The material is a nice follow-up to the Android talk of Jesse Burns from last year at #days, although this talk is more focused on the apps and shows some more hacks/code/encryption/obfuscation/reversing.
Bio: Tobias Ospelt is working as a security expert and tester for Dreamlab Technologies AG in Bern. He is mainly involved in web application and mobile security penetration tests. Tobias Ospelt joined Dreamlab after having achieved his Master Degree focusing IT-Security, and after having worked as a Research Assistant at the Zurich University of Applied Sciences.
Similar to Guardian Circle $GUARD Presentation - NeoDevCon 2019 (20)
13. Only Possible With NEO!
• In-App $GUARD Wallet
• Generate new wallet address on signup
• Airdrop starter $GUARD
• Bake $GUARD operations directly into UX (i.e. ‘one
click to tip’)
• Free new wallet generation (EOS: $1-$2 per new user)
14. Viral Neo
• Benefit accrues back to NEO
• Guardian Circle is naturally viral
• Compelling reason (SAFETY) to grant access to contacts &
send invites
• Sophisticated In-App Contact Manager
• Each signup produces a new $GUARD wallet (and thus
new NEO address)
• NEO end user viral growth