SlideShare a Scribd company logo
There is no security 
(and it feels just fine) 
Jonathan Care 
@arashiyama 
http://uk.linkedin.com/in/computercrime/
@arashiyama 
No Security: wtf?
@arashiyama 
kill off misconceptions
@arashiyama 
get past the sales talk
@arashiyama 
expose the cyber
We really do care about security and 
@arashiyama 
privacy…
@arashiyama
@arashiyama 
Meanwhile …
@arashiyama
What do IT guys actually care about? 
@arashiyama
@arashiyama Credit: 451 Research
three faces of information security 
@arashiyama
@arashiyama 
compliance
@arashiyama 
business enablement
@arashiyama 
real infosec
@arashiyama 
Security fail #1 : PCI DSS
Most breaches web-commerce based 
@arashiyama
Although compromised PEDs are fun 
@arashiyama 
too 
Security fail #2 : ICS/SCADA 
@arashiyama
Note: I will not visit you in prison if 
you get into trouble trying out this 
stuff. Also, SCADA systems control 
things that are IMPORTANT and 
should not be fscked with lightly 
@arashiyama
@arashiyama 
http://bit.ly/lyMi35 
Siemens, SIMATIC HMI, XP277, 6AV6 643-0CD01-1AX0, HW: 0, SW: V 1 1 2
@arashiyama 
http://bit.ly/jTlKsL 
(What temperature would you like your HVAC today?)
@arashiyama 
Wide open webcams?
@arashiyama 
Oh yeah.
Security fail #3 : Consumers 
@arashiyama
@arashiyama 
ecommerce
@arashiyama 
SaaS
@arashiyama 
(we are all consumers)
Security fail #4 – Software (!) 
@arashiyama
@arashiyama 
Heartbleed
@arashiyama 
ShellShock
@arashiyama
@arashiyama
So, how’s YOUR software dev doing? 
@arashiyama
@arashiyama
@arashiyama 
Conclusions:
@arashiyama 
1.All software has bugs.
2. Bugs will be discovered 
@arashiyama
3. Some bugs will have a security 
@arashiyama 
impact
4. Product owners continue to value 
@arashiyama 
functionality over security
5. Investors place little value on 
@arashiyama 
security and privacy
6. End users trust vendors 
@arashiyama
@arashiyama 
What can we do?
@arashiyama 
PROTECT 
RESPOND DETECT
SANS Top 20 Critical Controls 
@arashiyama
Policy, processes & guidelines 
InfoSec checkpoints in project lifecycle 
Threat Model 
Risk Appetite / Risk Tolerance 
@arashiyama 
Secure Software Environment 
Operational Security Controls 
Continuous Vulnerability Scan – 
Fix 
Penetration Testing / Red teaming 
Malware 
IDS / IPS 
Firewalls 
Centralised Logging (SIEM) 
Threat Intelligence 
PROTECT 
RESPOND DETECT 
Incident Response (Threat Model) 
Incident Response (“Bluebird”) 
Exec-level(press, clients) 
“Forensic Readiness” 
Update PROTECT model
Secure Software Environment - BSIMM 
@arashiyama
Secure 
Software 
Environment 
@arashiyama 
Governance 
Intelligence 
SSDL 
Touchpoints 
Deployment 
Strategy and Metrics 
Compliance and Policy 
Training 
Attack Models 
Security Features and Design 
Standards and Requirements 
Architecture Analysis 
Code Review 
Security Testing 
Penetration Testing 
Software Environment 
Configuration Mgmt / 
Vulnerability Mgmt
@arashiyama

More Related Content

Viewers also liked

Kiindumuskäitumine ja sõltuvuskäitumine
Kiindumuskäitumine ja sõltuvuskäitumineKiindumuskäitumine ja sõltuvuskäitumine
Kiindumuskäitumine ja sõltuvuskäitumineKalle Laane
 
Toetus alkoholi tarvitamisest loobumisel
Toetus alkoholi tarvitamisest loobumiselToetus alkoholi tarvitamisest loobumisel
Toetus alkoholi tarvitamisest loobumiselKalle Laane
 
Kergesti haavatavad sotsiaalsed rühmad
Kergesti haavatavad sotsiaalsed rühmadKergesti haavatavad sotsiaalsed rühmad
Kergesti haavatavad sotsiaalsed rühmadKalle Laane
 
IKT eta EMOZIOAK
IKT eta EMOZIOAKIKT eta EMOZIOAK
IKT eta EMOZIOAK
unaitoralesteban
 
ЧПЛП: спецмалювання. додаткова література
ЧПЛП: спецмалювання. додаткова літератураЧПЛП: спецмалювання. додаткова література
ЧПЛП: спецмалювання. додаткова література
Andrey Gumeniuk
 
ЧПЛП: Світ українського фентезі
ЧПЛП: Світ українського фентезіЧПЛП: Світ українського фентезі
ЧПЛП: Світ українського фентезі
Andrey Gumeniuk
 
ЧПЛП: Книжкова полиця педагога
ЧПЛП: Книжкова полиця педагогаЧПЛП: Книжкова полиця педагога
ЧПЛП: Книжкова полиця педагога
Andrey Gumeniuk
 
ЧПЛП: Гуртожиток
ЧПЛП: ГуртожитокЧПЛП: Гуртожиток
ЧПЛП: Гуртожиток
Andrey Gumeniuk
 
Портфоліо: Купа І.М. (ЧПЛП)
Портфоліо: Купа І.М. (ЧПЛП)Портфоліо: Купа І.М. (ЧПЛП)
Портфоліо: Купа І.М. (ЧПЛП)
Andrey Gumeniuk
 
Linux internals for Database administrators at Linux Piter 2016
Linux internals for Database administrators at Linux Piter 2016Linux internals for Database administrators at Linux Piter 2016
Linux internals for Database administrators at Linux Piter 2016
PostgreSQL-Consulting
 
ЧПЛП: Презентація класного керівника
ЧПЛП: Презентація класного керівникаЧПЛП: Презентація класного керівника
ЧПЛП: Презентація класного керівника
Andrey Gumeniuk
 
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya KosmodemianskyPostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
PostgreSQL-Consulting
 

Viewers also liked (13)

Kiindumuskäitumine ja sõltuvuskäitumine
Kiindumuskäitumine ja sõltuvuskäitumineKiindumuskäitumine ja sõltuvuskäitumine
Kiindumuskäitumine ja sõltuvuskäitumine
 
Toetus alkoholi tarvitamisest loobumisel
Toetus alkoholi tarvitamisest loobumiselToetus alkoholi tarvitamisest loobumisel
Toetus alkoholi tarvitamisest loobumisel
 
Kergesti haavatavad sotsiaalsed rühmad
Kergesti haavatavad sotsiaalsed rühmadKergesti haavatavad sotsiaalsed rühmad
Kergesti haavatavad sotsiaalsed rühmad
 
IKT eta EMOZIOAK
IKT eta EMOZIOAKIKT eta EMOZIOAK
IKT eta EMOZIOAK
 
ЧПЛП: спецмалювання. додаткова література
ЧПЛП: спецмалювання. додаткова літератураЧПЛП: спецмалювання. додаткова література
ЧПЛП: спецмалювання. додаткова література
 
ЧПЛП: Світ українського фентезі
ЧПЛП: Світ українського фентезіЧПЛП: Світ українського фентезі
ЧПЛП: Світ українського фентезі
 
ЧПЛП: Книжкова полиця педагога
ЧПЛП: Книжкова полиця педагогаЧПЛП: Книжкова полиця педагога
ЧПЛП: Книжкова полиця педагога
 
Motibazioa
MotibazioaMotibazioa
Motibazioa
 
ЧПЛП: Гуртожиток
ЧПЛП: ГуртожитокЧПЛП: Гуртожиток
ЧПЛП: Гуртожиток
 
Портфоліо: Купа І.М. (ЧПЛП)
Портфоліо: Купа І.М. (ЧПЛП)Портфоліо: Купа І.М. (ЧПЛП)
Портфоліо: Купа І.М. (ЧПЛП)
 
Linux internals for Database administrators at Linux Piter 2016
Linux internals for Database administrators at Linux Piter 2016Linux internals for Database administrators at Linux Piter 2016
Linux internals for Database administrators at Linux Piter 2016
 
ЧПЛП: Презентація класного керівника
ЧПЛП: Презентація класного керівникаЧПЛП: Презентація класного керівника
ЧПЛП: Презентація класного керівника
 
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya KosmodemianskyPostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmodemiansky
 

Similar to There is no security (and it feels just fine)

Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
Priyanka Aash
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
Teri Radichel
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
Addressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdfAddressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdf
CecilSu
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
InfosecTrain
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
Positive Hack Days
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
ThreatReel Podcast
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
 
Which generation of siem?
Which generation of siem?Which generation of siem?
Which generation of siem?
Ertugrul Akbas
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
akquinet enterprise solutions GmbH
 
Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...
Codemotion
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
Wendy Knox Everette
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
SBWebinars
 

Similar to There is no security (and it feels just fine) (20)

Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Addressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdfAddressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdf
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton Chuvakin
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Which generation of siem?
Which generation of siem?Which generation of siem?
Which generation of siem?
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

There is no security (and it feels just fine)

Editor's Notes

  1. There is a part of me that wonders why I am talking to hackers and pentesters (and possibly a couple of you are corporate types with your suits off) about this. Our industry is full of snake oil, from sales guys desperate to make their number, to consultants on a mission for fame and glory, and a boatload of products that frankly, don’t actually work. I want to give you guys a view from the other side of the mirror, so that if you encounter this stuff in your day jobs, you’ll be forearmed.
  2. People (sort of) care about it Lots of misconceptions Those of us in day jobs need to know about this stuff (if only in order to kill off misconceptions, sales talk, and outright lies)
  3. Expose the outright lies … oops
  4. A friend of mine David Lacey coined the phrase “three faces” which goes as follows
  5. Where most of the action lies Dominates the work of your internal security team Justifies the budget, produces large documentation trees, makes audit happy Based on ancient practices (not current threats)
  6. The board love it (“This guy understands the business!”) Enhance reputation, gain sales, innovate new products, new ways of working Sounds great, but its wishful thinking Rarely passes an investment appraisal board Even if it does, first year results do not justify further investment
  7. Expensive, difficult and disruptive * Manage current risks and threats, not last years audit actions Tackle advanced persistent threats (PEOPLE) * Speak up (those SCADA systems are still insecure) Take critical intellectual assets off the network * Tell project managers to go back to the drawing board Be prepared to be unpopular, and potentially unemployable
  8. DISCLAIMER: …. Or for that matter CONNECTED TO THE INTERNET
  9. Why on earth would you put an SNMP interface on the internet for a SCADA system? Why would you leave it with a default read string?
  10. If you remember the Dilbert voice controlled shower, having an environmental system open to the internet seems to invite a similar level of chaos. Nice toasty machine room, chilly office space… a complete recipe for chaos