SlideShare a Scribd company logo
1 of 118
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters
Vulnerabilities and Their Ethical Questions
Alfonso De Gregorio
Zeronomicon
#VULNETHICS@ZERONOMICON
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters
Vulnerabilities and Their Ethical Questions
Alfonso De Gregorio
Zeronomicon
#VULNETHICS@ZERONOMICON
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters
Vulnerabilities and Their Ethical Questions
Alfonso De Gregorio
Zeronomicon
#VULNETHICS@ZERONOMICON
Agenda
1. The Vulnerability Supply Chain
2. The Surrounding Ethical Questions
3. Code of Ethics: Principles and Standards
4. Concluding Remarks and Debate
Agenda
1. The Vulnerability Supply Chain
2. The Surrounding Ethical Questions
3. Code of Ethics: Principles and Standards
4. Concluding Remarks and Debate
SUPPLY CHAIN
THE VULNERABILITIES
VULNERABILITIES ARE LIKE POLLUTANTS
INCENTIVES
IT’S WHY WE DO THINGS
VULNERABILITY DUMPING
UNRESTRAINED
VULNERABILITY DUMPING
UNRESTRAINED
INCENTIVE
PERVERSE
– David Rice
“patching allows software manufacturers
to optimize market and legal
protections by "re-negotiating" contract
terms buyers could not
negotiate in the first place”
ETHICAL QUESTIONS
THE SURROUNDING
THE MORAL LOW GROUND?
WHO HOLDS
THAT EXPLOIT US THE MOST?
WHO ARE THE ONES
IF OUR GOVERNMENTS INTRODUCE TRADE
CONTROLS TO ADMINISTER THE EXPORT OF
INTRUSION SOFTWARE, SHOULD WE DEMAND
SOFTWARE MANUFACTURERS TO INTERNALISE THE
COST OF THE INSECURE SOFTWARE THAT WE
IMPORT INTO OUR LIVES, FOR REASONS OF
SYMMETRY?
SHOULD WE MAKE THEM LIABLE FOR THE DEFECTS
AND FLAWS THAT ALLOW THE INTRUSION IN THE
FIRST PLACE?
WITH INCOMPLETE KNOWLEDGE ABOUT THE REAL-
WORLD SECURITY OF SYSTEMS WE ENTRUST OUR
BUSINESS, IS IT ETHICAL TO REFRAIN US FROM
HUNTING VULNERABILITIES OR PREVENT OTHERS
FROM DOING LIKEWISE?
AND, WHAT SHOULD DO A SECURITY RESEARCHER
WITH THE VULNERABILITIES WHEN THEY GET
FOUND?
IS FULL DISCLOSURE AN ACCEPTABLE COURSE OF
ACTION?
DOES FULL DISCLOSURE BECOMES MORE
ACCEPTABLE IF THE AFFECTED VENDOR IGNORES
THE VULNERABILITIES THAT WERE REPORTED
RESPONSIBLY OR FAILS TO PROVIDE A TIMELY
PATCH?
DOES COORDINATED VULNERABILITY DISCLOSURE
PROVIDE A MORE ETHICALLY SOUND PATH TO BE
TAKEN?
DOES THE SAME PATH REMAINS MORALLY
PREFERABLE IF ONE OF THE PARTIES, WHO
RECEIVES THE VULNERABILITY INFORMATION FROM
THE COORDINATOR PRIOR TO ITS PUBLIC
DISCLOSURE, DECIDES TO USE IT TO EXPLOIT
VULNERABLE ENTITIES?
ARE BUG BOUNTY PROGRAMS EXPLOITING BOUNTY
HUNTERS?
SHOULD BUG HUNTERS PRETEND TO GET PAID IF
THE OTHER PARTY HAS NOT ASKED THEM TO DO
THEIR WORK?
WHAT GOVERNMENT SECURITY AGENCIES SHOULD
DO WITH VULNERABILITIES?
SHOULD THEY EXPLOIT THEM OR SHOULD THEY LET
EVERYBODY ELSE MITIGATE THEM, IN THE WAY
THEY ALREADY DO?
SHOULD THEY TAKE ADVANTAGE OF THOSE
VULNERABILITIES TO BENEFIT A LIMITED NUMBER
OF STAKEHOLDERS, OR SHOULD THEY DISCLOSE
THEM TO ALL AFFECTED CONSTITUENTS?
HAS THE POWER INEQUITY IN THE VULNERABILITY
EQUATION TO BE BALANCED?
WITH ENTITIES AFFECTED BY VULNERABILITIES
SPREAD ALL AROUND THE WORLD, HOW TO INFORM
THE PUBLIC?
WITH VENDORS THREATENING LEGAL ACTION AND
SUPPORTED BY THEIR SIGNIFICANT FINANCIAL
RESOURCES, HOW TO PROTECT THE SECURITY
RESEARCHERS?
CAN WE REGARD HACKING TO BE AN ETHICAL
PRACTICE AND CONDEMN, AT THE SAME TIME, THE
TRADE OF CAPABILITIES ENABLING THIS PRACTICE
AS IMMORAL?
CODE OF ETHICS
SIX PRINCIPLES
EIGHT STANDARDS
L GOALS AIMED AT GUIDING AND INS
THE ETHICAL STANDARDS ARE
ENFORCEABLE RULES FOR THE
DAY-TO-DAY BUSINESS
OPERATIONS.
PRINCIPLE A:
CLEAN HANDS
Respect all human rights proclaimed
by international human rights
treaties, including The International
Bill of Human Rights, and strive to
ensure no complicity in any human
rights abuses.
STANDARD 1: VETTING AND MONIT
Do not engage in any business with
entities known for abusing human
rights and reserves the right to
suspend or cease business
operations with entities found to be
involved at a later time in human
rights abuses.
PRINCIPLE B:
DO NOT POSE A DANGER TO HUMAN
Champion the health of human beings and
commit to do not enable your Customer entities
with capabilities that may pose a direct danger
to human health.
STANDARD 2:
INADMISSIBLE CAPABILITIES
Do not engage in any trade of capabilities that
exploit vulnerabilities in medical devices or in
systems to which human life is entrusted, unless
the Vendor of the affected device or system is the
Acquiring Entity or the Acquiring Entity was
authorised by the Vendor to be the recipient of
the vulnerability disclosure process, vulnerability
information, or risk mitigation strategy.
STANDARD 3:
TRADE SECRETS
You will never trade in stolen trade secrets, and
require your suppliers to certify that they have
independently discovered the vulnerability and
autonomously developed any related technology,
and that they are not employees of the targeted
software manufacturer, nor have they received
access to the confidential information through a
disclosure by the same.
PRINCIPLE C:
AVOID CONFLICTS OF INTEREST
Strive to benefit those with whom you do
business and take care to avoid possible
conflicts of interest that could cause your
Company, its Employees, or Contractors to
pursue goals not in the interest of the Company
business peers.
STANDARD 4:
OVEREXPLOITATION
You will protect the value of the traded capabilities.
You will specify the maximum number of entities to
which the same capabilities may be sold, within a
given time-frame (unless in case the capabilities are
intended for risk prevention).
Furthermore, you shall strive not to sell a
vulnerability to one party, and the technology to
defend against that vulnerability to another party
which is a likely target of the first.
STANDARD 5:
UNINTENDED USE
Prohibit yourself, employees and contractors to use
the information or the capabilities, traded in the
fulfilment of the service, for the pursuit of personal
goals. Authorised personnel shall use such
capabilities only to test and validate them, and more
generally only for research and development
purposes.
PRINCIPLE D:
OBEY THE LAW
Comply with all applicable legal requirements
and understands the major laws and
regulations that apply to your business,
including laws related to: trade controls, anti-
bribery, competition, trade secret, money
laundering and insider trading.
STANDARD 6:
EXPORTING
Comply with trade laws controlling where
the you can send products and services,
strive to meet the criteria required to hold
export licenses, where applicable, and stay
alert to changes to the applicable export
licensing systems.
PRINCIPLE E:
PRESERVE CONFIDENTIALITY
Protect the confidentiality of the identity of
entities you do business with and the the
confidentiality of the information and
intellectual properties received from, or
provided to, your business peers in the
fulfilment of your Service. At the same time,
recognize that the extent and limits of
confidentiality may be regulated by applicable
laws and regulations.
STANDARD 7:
MAINTAINING CONFIDENTIALITY
At the extent and limits regulated by
applicable laws and regulations, preserve
the confidentiality of the identity of entities
you do business with. Restrict access to the
information and the intellectual property
received from or provided to your business
partners on a need-to-know basis, enforcing
a principle of least privilege
PRINCIPLE F: DOCTRINE OF DOUBL
Acknowledge that the capabilities you provide may be used within
goods that, just like any and all information security tools, are
inherently dual use and therefore may serve also military purposes,
police investigations and the like; the military use of the traded
capabilities may have a double effect: the intended effect and the
foreseen but genuinely unintended consequence. While discouraging
against harmful side effects, you acknowledge the inherent duality of
the effects resulting from the use of those capabilities and you trade
them, unless they are in conflict with other principles set forth in the
present Ethics Code.
STANDARD 8: DUALITY
Acknowledge that the capabilities you provide can
be used within goods that are inherently dual use
and accept to supply them, as long as it is
foreseeable that those capabilities will be used only
for legitimate purposes in line with international
standards for the respect of human rights, and
unless their trade is in conflict with principles set out
in the present Ethics Code.
CONCLUDING REMARKS
AND DEBATE
– Ayn Rand
“Every aspect of Western culture needs a
new code of ethics — a rational ethics — as
a precondition of rebirth.”
Every aspect of the vulnerabilities
supply chain needs a new code of ethics
— a rational ethics — as a precondition
of rebirth.
– Earl Warren
“In a civilised life, law floats in a sea of
ethics.”
THANK YOU!
QUESTIONS?
Ковбой Энди, Рик Декард и другие охотники за наградой

More Related Content

Viewers also liked

Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОВосток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОPositive Hack Days
 
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationJanitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationPositive Hack Days
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
 
Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPPositive Hack Days
 
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиMagic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиPositive Hack Days
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюPositive Hack Days
 
Боремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхБоремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхPositive Hack Days
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorPositive Hack Days
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructPositive Hack Days
 
Вирусы есть? А если найду?
Вирусы есть? А если найду?Вирусы есть? А если найду?
Вирусы есть? А если найду?Positive Hack Days
 
Использование KASan для автономного гипервизора
Использование KASan для автономного гипервизораИспользование KASan для автономного гипервизора
Использование KASan для автономного гипервизораPositive Hack Days
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types LaterPositive Hack Days
 
Псевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовПсевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовPositive Hack Days
 
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Positive Hack Days
 
Application security? Firewall it!
Application security? Firewall it!Application security? Firewall it!
Application security? Firewall it!Positive Hack Days
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиPositive Hack Days
 
Безопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаБезопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаPositive Hack Days
 
Метод машинного обучения для распознавания сгенерированных доменных имен
Метод машинного обучения для распознавания сгенерированных доменных именМетод машинного обучения для распознавания сгенерированных доменных имен
Метод машинного обучения для распознавания сгенерированных доменных именPositive Hack Days
 
Страх и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахСтрах и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахPositive Hack Days
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиPositive Hack Days
 

Viewers also liked (20)

Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОВосток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
 
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationJanitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 
Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAP
 
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиMagic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
Боремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхБоремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играх
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai Struct
 
Вирусы есть? А если найду?
Вирусы есть? А если найду?Вирусы есть? А если найду?
Вирусы есть? А если найду?
 
Использование KASan для автономного гипервизора
Использование KASan для автономного гипервизораИспользование KASan для автономного гипервизора
Использование KASan для автономного гипервизора
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
 
Псевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовПсевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисов
 
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
 
Application security? Firewall it!
Application security? Firewall it!Application security? Firewall it!
Application security? Firewall it!
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 
Безопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаБезопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без друга
 
Метод машинного обучения для распознавания сгенерированных доменных имен
Метод машинного обучения для распознавания сгенерированных доменных именМетод машинного обучения для распознавания сгенерированных доменных имен
Метод машинного обучения для распознавания сгенерированных доменных имен
 
Страх и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахСтрах и ненависть в телеком-операторах
Страх и ненависть в телеком-операторах
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
 

Similar to Ковбой Энди, Рик Декард и другие охотники за наградой

The Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiv
The Vulnerability Supply Chain - HackIT Ukraine 2016, KharkivThe Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiv
The Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiva001
 
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...a001
 
International Principles for Whistleblower Legislation 2013
International Principles for Whistleblower Legislation 2013International Principles for Whistleblower Legislation 2013
International Principles for Whistleblower Legislation 2013Miqui Mel
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
consumer protection act.pptx
consumer protection act.pptxconsumer protection act.pptx
consumer protection act.pptxketan349068
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
New legal obligations and liability under MDR and IVDR
New legal obligations and liability under MDR and IVDRNew legal obligations and liability under MDR and IVDR
New legal obligations and liability under MDR and IVDRErik Vollebregt
 
Whistleblowing and Whistleblower Protection Act
Whistleblowing and Whistleblower Protection ActWhistleblowing and Whistleblower Protection Act
Whistleblowing and Whistleblower Protection ActMohammad Mohtashim
 
Basics of FDA Regulation of Device & IVD Advertising
Basics of FDA Regulation of Device & IVD AdvertisingBasics of FDA Regulation of Device & IVD Advertising
Basics of FDA Regulation of Device & IVD AdvertisingMichael Swit
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade SecretsRajat Agrawal
 
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,..."Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...Edge AI and Vision Alliance
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 

Similar to Ковбой Энди, Рик Декард и другие охотники за наградой (20)

The Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiv
The Vulnerability Supply Chain - HackIT Ukraine 2016, KharkivThe Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiv
The Vulnerability Supply Chain - HackIT Ukraine 2016, Kharkiv
 
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
 
International Principles for Whistleblower Legislation 2013
International Principles for Whistleblower Legislation 2013International Principles for Whistleblower Legislation 2013
International Principles for Whistleblower Legislation 2013
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
consumer protection act.pptx
consumer protection act.pptxconsumer protection act.pptx
consumer protection act.pptx
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
New legal obligations and liability under MDR and IVDR
New legal obligations and liability under MDR and IVDRNew legal obligations and liability under MDR and IVDR
New legal obligations and liability under MDR and IVDR
 
Whistleblowing and Whistleblower Protection Act
Whistleblowing and Whistleblower Protection ActWhistleblowing and Whistleblower Protection Act
Whistleblowing and Whistleblower Protection Act
 
Basics of FDA Regulation of Device & IVD Advertising
Basics of FDA Regulation of Device & IVD AdvertisingBasics of FDA Regulation of Device & IVD Advertising
Basics of FDA Regulation of Device & IVD Advertising
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade Secrets
 
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,..."Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...
"Potential Impacts of Privacy Regulation and Litigation on Vision Technology,...
 
William J. Kolasky Antitrust Compliance Programs The Governm
William J. Kolasky Antitrust Compliance Programs The GovernmWilliam J. Kolasky Antitrust Compliance Programs The Governm
William J. Kolasky Antitrust Compliance Programs The Governm
 
William j. kolasky antitrust compliance programs the governm
William j. kolasky antitrust compliance programs the governmWilliam j. kolasky antitrust compliance programs the governm
William j. kolasky antitrust compliance programs the governm
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 

More from Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Recently uploaded (20)

NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

Ковбой Энди, Рик Декард и другие охотники за наградой

  • 1. Andy, the Polluters, Rick Deckard, and Other Bounty Hunters Vulnerabilities and Their Ethical Questions Alfonso De Gregorio Zeronomicon #VULNETHICS@ZERONOMICON
  • 2. Andy, the Polluters, Rick Deckard, and Other Bounty Hunters Vulnerabilities and Their Ethical Questions Alfonso De Gregorio Zeronomicon #VULNETHICS@ZERONOMICON
  • 3. Andy, the Polluters, Rick Deckard, and Other Bounty Hunters Vulnerabilities and Their Ethical Questions Alfonso De Gregorio Zeronomicon #VULNETHICS@ZERONOMICON
  • 4. Agenda 1. The Vulnerability Supply Chain 2. The Surrounding Ethical Questions 3. Code of Ethics: Principles and Standards 4. Concluding Remarks and Debate
  • 5. Agenda 1. The Vulnerability Supply Chain 2. The Surrounding Ethical Questions 3. Code of Ethics: Principles and Standards 4. Concluding Remarks and Debate
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 53. – David Rice “patching allows software manufacturers to optimize market and legal protections by "re-negotiating" contract terms buyers could not negotiate in the first place”
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75. THE MORAL LOW GROUND? WHO HOLDS
  • 76. THAT EXPLOIT US THE MOST? WHO ARE THE ONES
  • 77. IF OUR GOVERNMENTS INTRODUCE TRADE CONTROLS TO ADMINISTER THE EXPORT OF INTRUSION SOFTWARE, SHOULD WE DEMAND SOFTWARE MANUFACTURERS TO INTERNALISE THE COST OF THE INSECURE SOFTWARE THAT WE IMPORT INTO OUR LIVES, FOR REASONS OF SYMMETRY?
  • 78. SHOULD WE MAKE THEM LIABLE FOR THE DEFECTS AND FLAWS THAT ALLOW THE INTRUSION IN THE FIRST PLACE?
  • 79. WITH INCOMPLETE KNOWLEDGE ABOUT THE REAL- WORLD SECURITY OF SYSTEMS WE ENTRUST OUR BUSINESS, IS IT ETHICAL TO REFRAIN US FROM HUNTING VULNERABILITIES OR PREVENT OTHERS FROM DOING LIKEWISE?
  • 80. AND, WHAT SHOULD DO A SECURITY RESEARCHER WITH THE VULNERABILITIES WHEN THEY GET FOUND?
  • 81. IS FULL DISCLOSURE AN ACCEPTABLE COURSE OF ACTION?
  • 82. DOES FULL DISCLOSURE BECOMES MORE ACCEPTABLE IF THE AFFECTED VENDOR IGNORES THE VULNERABILITIES THAT WERE REPORTED RESPONSIBLY OR FAILS TO PROVIDE A TIMELY PATCH?
  • 83. DOES COORDINATED VULNERABILITY DISCLOSURE PROVIDE A MORE ETHICALLY SOUND PATH TO BE TAKEN?
  • 84. DOES THE SAME PATH REMAINS MORALLY PREFERABLE IF ONE OF THE PARTIES, WHO RECEIVES THE VULNERABILITY INFORMATION FROM THE COORDINATOR PRIOR TO ITS PUBLIC DISCLOSURE, DECIDES TO USE IT TO EXPLOIT VULNERABLE ENTITIES?
  • 85. ARE BUG BOUNTY PROGRAMS EXPLOITING BOUNTY HUNTERS?
  • 86. SHOULD BUG HUNTERS PRETEND TO GET PAID IF THE OTHER PARTY HAS NOT ASKED THEM TO DO THEIR WORK?
  • 87. WHAT GOVERNMENT SECURITY AGENCIES SHOULD DO WITH VULNERABILITIES?
  • 88. SHOULD THEY EXPLOIT THEM OR SHOULD THEY LET EVERYBODY ELSE MITIGATE THEM, IN THE WAY THEY ALREADY DO?
  • 89. SHOULD THEY TAKE ADVANTAGE OF THOSE VULNERABILITIES TO BENEFIT A LIMITED NUMBER OF STAKEHOLDERS, OR SHOULD THEY DISCLOSE THEM TO ALL AFFECTED CONSTITUENTS?
  • 90. HAS THE POWER INEQUITY IN THE VULNERABILITY EQUATION TO BE BALANCED?
  • 91. WITH ENTITIES AFFECTED BY VULNERABILITIES SPREAD ALL AROUND THE WORLD, HOW TO INFORM THE PUBLIC?
  • 92. WITH VENDORS THREATENING LEGAL ACTION AND SUPPORTED BY THEIR SIGNIFICANT FINANCIAL RESOURCES, HOW TO PROTECT THE SECURITY RESEARCHERS?
  • 93. CAN WE REGARD HACKING TO BE AN ETHICAL PRACTICE AND CONDEMN, AT THE SAME TIME, THE TRADE OF CAPABILITIES ENABLING THIS PRACTICE AS IMMORAL?
  • 96. L GOALS AIMED AT GUIDING AND INS
  • 97. THE ETHICAL STANDARDS ARE ENFORCEABLE RULES FOR THE DAY-TO-DAY BUSINESS OPERATIONS.
  • 98. PRINCIPLE A: CLEAN HANDS Respect all human rights proclaimed by international human rights treaties, including The International Bill of Human Rights, and strive to ensure no complicity in any human rights abuses.
  • 99. STANDARD 1: VETTING AND MONIT Do not engage in any business with entities known for abusing human rights and reserves the right to suspend or cease business operations with entities found to be involved at a later time in human rights abuses.
  • 100. PRINCIPLE B: DO NOT POSE A DANGER TO HUMAN Champion the health of human beings and commit to do not enable your Customer entities with capabilities that may pose a direct danger to human health.
  • 101. STANDARD 2: INADMISSIBLE CAPABILITIES Do not engage in any trade of capabilities that exploit vulnerabilities in medical devices or in systems to which human life is entrusted, unless the Vendor of the affected device or system is the Acquiring Entity or the Acquiring Entity was authorised by the Vendor to be the recipient of the vulnerability disclosure process, vulnerability information, or risk mitigation strategy.
  • 102. STANDARD 3: TRADE SECRETS You will never trade in stolen trade secrets, and require your suppliers to certify that they have independently discovered the vulnerability and autonomously developed any related technology, and that they are not employees of the targeted software manufacturer, nor have they received access to the confidential information through a disclosure by the same.
  • 103.
  • 104. PRINCIPLE C: AVOID CONFLICTS OF INTEREST Strive to benefit those with whom you do business and take care to avoid possible conflicts of interest that could cause your Company, its Employees, or Contractors to pursue goals not in the interest of the Company business peers.
  • 105. STANDARD 4: OVEREXPLOITATION You will protect the value of the traded capabilities. You will specify the maximum number of entities to which the same capabilities may be sold, within a given time-frame (unless in case the capabilities are intended for risk prevention). Furthermore, you shall strive not to sell a vulnerability to one party, and the technology to defend against that vulnerability to another party which is a likely target of the first.
  • 106. STANDARD 5: UNINTENDED USE Prohibit yourself, employees and contractors to use the information or the capabilities, traded in the fulfilment of the service, for the pursuit of personal goals. Authorised personnel shall use such capabilities only to test and validate them, and more generally only for research and development purposes.
  • 107. PRINCIPLE D: OBEY THE LAW Comply with all applicable legal requirements and understands the major laws and regulations that apply to your business, including laws related to: trade controls, anti- bribery, competition, trade secret, money laundering and insider trading.
  • 108. STANDARD 6: EXPORTING Comply with trade laws controlling where the you can send products and services, strive to meet the criteria required to hold export licenses, where applicable, and stay alert to changes to the applicable export licensing systems.
  • 109. PRINCIPLE E: PRESERVE CONFIDENTIALITY Protect the confidentiality of the identity of entities you do business with and the the confidentiality of the information and intellectual properties received from, or provided to, your business peers in the fulfilment of your Service. At the same time, recognize that the extent and limits of confidentiality may be regulated by applicable laws and regulations.
  • 110. STANDARD 7: MAINTAINING CONFIDENTIALITY At the extent and limits regulated by applicable laws and regulations, preserve the confidentiality of the identity of entities you do business with. Restrict access to the information and the intellectual property received from or provided to your business partners on a need-to-know basis, enforcing a principle of least privilege
  • 111. PRINCIPLE F: DOCTRINE OF DOUBL Acknowledge that the capabilities you provide may be used within goods that, just like any and all information security tools, are inherently dual use and therefore may serve also military purposes, police investigations and the like; the military use of the traded capabilities may have a double effect: the intended effect and the foreseen but genuinely unintended consequence. While discouraging against harmful side effects, you acknowledge the inherent duality of the effects resulting from the use of those capabilities and you trade them, unless they are in conflict with other principles set forth in the present Ethics Code.
  • 112. STANDARD 8: DUALITY Acknowledge that the capabilities you provide can be used within goods that are inherently dual use and accept to supply them, as long as it is foreseeable that those capabilities will be used only for legitimate purposes in line with international standards for the respect of human rights, and unless their trade is in conflict with principles set out in the present Ethics Code.
  • 114. – Ayn Rand “Every aspect of Western culture needs a new code of ethics — a rational ethics — as a precondition of rebirth.”
  • 115. Every aspect of the vulnerabilities supply chain needs a new code of ethics — a rational ethics — as a precondition of rebirth.
  • 116. – Earl Warren “In a civilised life, law floats in a sea of ethics.”

Editor's Notes

  1. Good evening everybody. Thank you for the opportunity to speak with you today. One year ago, I had the privilege to be here with you at PHDays and to present, for the first time, the preliminary results on an ongoing study on extortion and cooperation in the zero-day markets through the lens of game theory. The research received an enormous interest by all the parties involved. And in the rest of the year, I had the opportunity to further present those results to other esteemed audiences across the globe and to listen to their remarks and comments.
  2. Most notably, a colleague in Japan asked me about the ethical questions related to the trading of vulnerability information and if they were meaningless to me. While they are far from being meaningless to me, at that time I sidestepped providing to this friend a fully satisfactory answer. In fact, I was not directly involved into this business and my focus was on the economics of vulnerability markets. Hence, I suggested that there were different sensibilities around the world regarding the applicable ethical dilemmas and that if we worked towards aligning the incentives in the industry we would have, in turn, lead to business practices of higher ethicality.
  3. Later, and after careful consideration, I decided to go from theory to practice and entered this space. But in so doing, the ethical questions related to the trade of vulnerability information could not be further postponed.
  4. With your help, what I want to do today is to briefly review the vulnerability supply chain, its main actors, and their surrounding ethical questions. After setting the context, I will share with you how I decided to approach these questions in my occupation and report on the ethical principles and standards I set forth in Code of Business Ethics that I adopted in my day-to-day business operations.
  5. In doing so, it is not my intention neither to lecture anybody about how we are expected to behave, nor to provide definitive answers to pressing challenges. I will be happy if will have asked more questions than given answers, or if I will have contributed some meaningful ethical principles and standards to build upon. So, let’s get started.
  6. How many of you are familiar with the Philip K. Dick’s 1968 novel ‘Do Androids Dream of Electric Sheep’? Anyone?
  7. And how many of you are familiar with the Ridley Scott’s 1982 film ‘Blade Runner’?
  8. The story I want to tell you today is a story that finds inspiration in a science fiction novel, and, as we are about to overtake the period in which the novel is set, informs us about the present we are living in, about some of the ethical questions it raises, and how I decided to approach them in my occupation. Shortly I will introduce you to the dramatis personae of our story. Their story is the story of the supply chain of vulnerabilities, composed, among others, of:
  9. software makers, creating vulnerabilities during the products’ development lifecycle;
  10. vulnerability researchers, finding existing vulnerabilities and creating exploits to take-advantage of them;
  11. brokers, trading vulnerability intelligence or zero-day exploits; and,
  12. and, organisations using the resulting capabilities, for good or ill. Their story is also our story. Let’s try to draw a parallel between the fictional A.D. 2019 depicted in Blade Runner and the present we are living in.
  13. The A.D. 2019 depicted in Blade Runner “[i]t is a time of societal decline, where technology has polluted the earth and seized control of the cities.” [1] Enormous power is in the hands of corporations. Los Angeles “appears to have turned into one of Jeremy Bentham's Panopticons, whereby one cannot tell if one is being watched, but it is possible that one is being watched at all times, which means extreme caution must be exercised at all times.” [2] “The […] roving spotlight, present throughout the film, suggest constant surveillance.” [2] And the replicants need to stay ‘in character’ even when alone.
  14. This is what Harvard psychologist Shoshana Zuboff called in 1988 “anticipatory conformity”. Interestingly, surveillance is not the only point of contact between fiction and reality. Let’s consider pollution.
  15. Vulnerabilities are like pollutants: the private up-front cost of insecure software — as it happens for the cost of waste dumping, for instance — is near zero to most, but the social cost of it is quite high, almost unbearable.
  16. That is to say that, as for today, software security is an externality, because the market does not provide significant or compelling incentives for developing secure software. As a result,
  17. software makers are practising…
  18. Unrestrained vulnerability dumping onto the…
  19. Downstream
  20. market
  21. participants This comes as no surprise. Building security into our products is in stark contrast with the
  22. Ship…
  23. Then test…
  24. … paradigm [5] and the "don't worry, be crappy" mantra [6], advocated by entrepreneurs innovating the most.
  25. In the absence of policy discouraging the…
  26. dumping of vulnerabilities onto the…
  27. downstream
  28. market
  29. participants
  30. defenders are too busy mopping the floor…
  31. to turn off the faucet.
  32. That is to say that “[t]he market…
  33. participants….
  34. patching
  35. filtering and…
  36. protecting their systems will do little to stop
  37. dump of pollution that occurs upstream.
  38. Hence, “[p]oorly written, insecure software
  39. is no longer a technology issue;
  40. is a public policy issue.
  41. Software vulnerabilities leave…
  42. consumers
  43. businesses
  44. national infrastructures
  45. governments
  46. and military
  47. consusceptible to […] attacks. Even worse…
  48. there is no such thing as bug-free software.
  49. Every software of non trivial complexity contains bugs.
  50. This means we will need to patch the software we entrust our business.
  51. Yet, patching plays as a perverse incentive, allowing…
  52. software manufacturers to optimise market and legal protections by re-negotiating contract terms buyers could not negotiate in the first place.
  53. This is how, every time a vulnerability comes out, we find ourselves signing a new licensing agreement. But this gives the manufacturers the ability to re-negotiate contract terms we could not negotiate in the first place.
  54. So we have a choice. We have a take it or leave it choice. I can either accept the license agreement, so I can keep patching the vulnerabilities affecting the software I rely on. Or, not take it and risk exploitation. It's a deal I can't refuse — and neither can you.
  55. All of which is to say, that corporate power…
  56. All of which is to say, that corporate power is as much a key-feature of Blade Runner…
  57. as much as a signature of our industry.
  58. And, as a final note of color, the slogan of the Shimago-Dominguez Corporation is "Helping America into the New World”, while the slogan …
  59. chosen by Trump for his campaign is “Make America Great Again”. Don’t you think they are surprisingly close to each other?
  60. Meet Rick Deckard. Deckard is a selfish and self-involved specialist plainclothes ex police officer, or an officially sanctioned bounty hunter, who goes after renegade androids, also known as “andys”.
  61. Here surely, is where the parallel breaks down. Officially or tacitly sanctioned, the bounty hunters in the information security industry are certainly not faced with “retiring” six escaped Nexus-6 androids.
  62. We are after the pollutants dumped by the
  63. software makers
  64. upstream
  65. and we write code to constructively prove their risks.
  66. Organisations, both in the government and in the industry sector, demand the findings of these researches, to enable their security strategies
  67. and various types of marketplaces compete with each other in order to win the preference of bounty hunters
  68. towards their vulnerability disclosure policy of choice.
  69. Wherever we turn our attention in the vulnerabilities supply chain, from…
  70. software vendors
  71. to vulnerability researchers
  72. to government agencies
  73. all industry actors face their respective ethical issues related to the vulnerabilities affecting networked devices and the knowledge of their existence. Therefore I want to ask you
  74. the ruthless malefactors profiting from yet another remote code execution vulnerability, or the vendors practicing unrestrained vulnerability dumping onto the downstream market participants?
  75. the foreign security services taking total control of our mobile handsets, or the vendors using patching to optimize market and legal protections by re-negotiating contract terms users could not negotiate in the first place and from which the users have no satisfactory way to escape?
  76. As an ethically concerned trader of vulnerability information and security capabilities, I established a code of business ethics and I hold to its principles and standards in the conduct of my business.
  77. I set forth six principles and eight corresponding ethical standards.
  78. The principles are aspirational goals aimed at guiding and inspiring the conduct of business, and they underpin the ethical standards.
  79. The ethical standards are enforceable rules for the day-to-day business operations. Let’s give a look to them.
  80. No, it is not my aspiration to run a company involved in any human rights abuse. Therefore I vet and monitor my Customers.
  81. All of which is to say that, no, I don’t want software maker employees to join the bug bonanza and to write them a new minivan this afternoon
  82. And that is pretty much it as far as my code of ethics goes.
  83. Today I am honoured to be with you back in Moscow and I am reminded about the Russian-born Али́са Зино́вьевна Розенба́ум, whom once remarked:
  84. I feel similarly with regard to the debate surrounding vulnerabilities:
  85. In this spirit, I established the first code of ethics focused on the trade of vulnerability information and, today, I offered its principles and standards up for your comments and criticism.
  86. If, as noted by Earl Warren, “[i]n a civilised life, law floats in a sea of ethics”, it is both my hope and wish that our reflections will inform policy markers. I welcome all your thoughts. Thank you.