SlideShare a Scribd company logo
The State Of VoIP Security, a.k.a.!
                   !
“Does Anyone Really Give A _____ About
           VoIP Security?”




               Dan York, CISSP!
        Chair, VoIP Security Alliance



                                         October 5, 2011
© 2011 VOIPSA
                http://www.flickr.com/photos/willpate/46488553/
Does Anyone Really !
                Give A _____ About!
                  VoIP Security?


© 2011 VOIPSA
Does Anyone Really !
        Give A _____ About!
           VoIP Unified
     Communications Security?

© 2011 VOIPSA
Technical Solutions




© 2011 VOIPSA
Widely Deployed




© 2011 VOIPSA
TLS-Encrypted SIP




© 2011 VOIPSA
Secure RTP (SRTP)




© 2011 VOIPSA
MORE Secure!
                 Than PSTN



© 2011 VOIPSA
© 2011 VOIPSA
                http://www.flickr.com/photos/mattblaze/2275723713/
MORE Secure!
                Than Ever Before



© 2011 VOIPSA
Almost All Venders!
                  Have Support



© 2011 VOIPSA
Almost All Customers!
                  Don’t Turn It On



© 2011 VOIPSA
Why Not?




© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing, a.k.a. “One Throat To Choke”



                              PSTN
                   PBX       Gateways




                             Physical
                 Voicemail
                              Wiring




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
“UC”




© 2011 VOIPSA
Debugging




© 2011 VOIPSA
Turn It Back On?




© 2011 VOIPSA
SIP Is So Simple, Right?




© 2011 VOIPSA
Riiiiiigggghhhttt… (Fingerpointing Redux)




© 2011 VOIPSA
Evolution




© 2011 VOIPSA
The Old Boys’ Club


                                  Carrier
                                                 Carrier
                    Carrier



                                  PSTN                Carrier
                Carrier


                              Carrier       Carrier




© 2011 VOIPSA
The Wild West… 
                                                                    ITSP
                                                                                                    ITSP
                                                                                                                   ITSP
                                                                     ITSP
                                             ITSP

                                                                                                       ITSP

                                                                                                                           ITSP
                              ITSP
                                                                  ITSP
                                                                                     ITSP              ITSP
                                                    ITSP
                                                                                                                      ITSP


                     ITSP                                         PSTN                       ITSP
                                                ITSP

                     ITSP                                                                                   ITSP
                                                              ITSP            ITSP
                                      ITSP

     ITSP
                                                                                                     ITSP           ITSP
                     ITSP                    ITSP      ITSP                        ITSP



                                                                                                    ITSP       ITSP
      ITSP                           ITSP                  ITSP             ITSP          ITSP
© 2010 VOIPSA and Owners as Marked
© 2011 VOIPSA
Evolution of Attacks




© 2011 VOIPSA
DoS




© 2011 VOIPSA
DDoS




© 2011 VOIPSA
Fraud




© 2011 VOIPSA
If 1 Is Good, Why Not 3?




© 2011 VOIPSA
Geography



© 2011 VOIPSA
Internet   LAN




© 2011 VOIPSA
PC


                    UC
                  System
                                 Firewall   Internet    Home
                                                       Firewall



                                                                    IP
                Corp	
  HQ	
                                      Phone
                                                       Home	
  




© 2011 VOIPSA
Laptop
                                                                         UC
                                                                        client
                                                          WiFi
                    UC
                  System
                                 Firewall   Internet      Café
                                                         Router



                Corp	
  HQ	
  
                                               Mobile
                                                Data
                                               Network        Mobile
                                                               UC
                                                              client




© 2011 VOIPSA
Corporate
                                                                   Internet
                             Network

                                                             IVR                    Voicemail
                   IM             IM              IM

                Presence       Presence        Presence

                  Call           Call            Call
                 Control        Control         Control              Conferencing




           Corp	
  HQ	
      Office	
  A	
     Office	
  B	
  



                             PSTN


© 2011 VOIPSA
© 2011 VOIPSA
Benefits
                (for us… and for attackers)




© 2011 VOIPSA
DDoS!
                     (the old-fashioned kind)!
                                               
                (Asterisk & Amazon EC2, anyone?)




© 2011 VOIPSA
SPIT!
                                              
                (“SPam for Internet Telephony”)




                           SPAM

© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
The Device Formerly!
                    Known As A!
                     “Phone”



© 2011 VOIPSA
Mobility




© 2011 VOIPSA
RTCWEB / WebRTC




© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
Interoperability




© 2011 VOIPSA
“The Hitchiker’s Guide!
                       To SIP”



© 2011 VOIPSA
Forgotten!
                Simple Things



© 2011 VOIPSA
Biggest Financial Threat?




© 2011 VOIPSA
Toll Fraud




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
PIN = “1234”




© 2011 VOIPSA
Password = “password”




© 2011 VOIPSA
Default password list




© 2011 VOIPSA
VoIP = bits




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
Does Anyone Really !
                Give A _____ About!
                  VoIP Security?


© 2011 VOIPSA
WHEN Will They Care?




© 2011 VOIPSA
EVENT




© 2011 VOIPSA
Identity Theft




© 2011 VOIPSA
Celebrity




© 2011 VOIPSA
Trusted Leader




© 2011 VOIPSA
“VoIP Is Insecure!!!”




© 2011 VOIPSA
depl oyed
            tupi dly
        S
                “VoIP Is Insecure!!!”
                 ^



© 2011 VOIPSA
“VoIP Is Insecure!!!”




© 2011 VOIPSA
Cover Your ____




© 2011 VOIPSA
SOLUTIONS?




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
Audit, Audit, Audit




© 2011 VOIPSA
Enable What You Have




© 2011 VOIPSA
Interoperability




© 2011 VOIPSA
www.sipit.net




© 2011 VOIPSA
Identity




© 2011 VOIPSA
Simplicity




© 2011 VOIPSA
Fabric




© 2011 VOIPSA
Air




© 2011 VOIPSA
© 2011 VOIPSA
Secure By Default




© 2011 VOIPSA
Education




© 2011 VOIPSA
What is the Industry Doing to Help?




       Security Vendors                  VoIP Vendors

       “The Sky Is Falling!”             “Don’t Worry, Trust Us!”
       (Buy our products!)                 (Buy our products!)




© 2011 VOIPSA
www.voipsa.org/Resources/tools.php




© 2011 VOIPSA
Security Links

    •  VoIP Security Alliance - http://www.voipsa.org/ 
         –  Threat Taxonomy      
- http://www.voipsa.org/Activities/taxonomy.php
         –  VOIPSEC email list   
- http://www.voipsa.org/VOIPSEC/
         –  Weblog 
        
    
- http://www.voipsa.org/blog/
         –  Security Tools list  
- http://www.voipsa.org/Resources/tools.php
         –  Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com 


    •  NIST SP800-58, “Security Considerations for VoIP Systems”
         –  http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
    •  Network Security Tools
         –  http://sectools.org/
    •  Hacking Exposed VoIP site and tools
         –  http://www.hackingvoip.com/
    •  Seven Deadliest Unified Communications Attacks
         –  http://www.7ducattacks.com/



© 2011 VOIPSA
Thank You For!
                Giving A _____



© 2011 VOIPSA
Thank you!               Q & eh?




                www.voipsa.org
                                                   7ducattacks.com

                Dan York - dan.york@voipsa.org!
                +1-802-735-1624
                DisruptiveTelephony.com
                danyork.com!                      blueboxpodcast.com
                twitter.com/danyork




© 2011 VOIPSA

More Related Content

More from Dan York

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Dan York
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?
Dan York
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
Dan York
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Dan York
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Dan York
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Dan York
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
Dan York
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
Dan York
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
Dan York
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
Dan York
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
Dan York
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
Dan York
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
Dan York
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
Dan York
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
Dan York
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
Dan York
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
Dan York
 

More from Dan York (17)

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoIP Security?"