SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Future Security
ZACon Conference
A Olivier
anthony.desmond.olivier@gmail.com
Twitter: anthonyolivier
www.discussIT.co.za
Opinions
“We have had the same Information Security problems for 25 years. We
    still haven’t solved them”



“For $200.000 dollars you can hire the hacking team that will crack
     anything. That’s less than the average American bank’s Anti Virus
     budget”



“We are being overwhelmed by governance”



“The complexity of new IT systems exceeds our capacities to secure them”
The security cost curve?
                                   This is the
                                    security
                                    frontier


 Operations     New            Opportunity cost



   Process        Process          Process

    Data           Data             Data

 Applications   Applications    Applications
   Systems        Systems         Systems

  Perimeter      Perimeter        Perimeter
`The Frontier: Semantic Web
 The Semantic Web is an evolving development of
 the World Wide Web in which the meaning
 (semantics) of information and services on the web is
 defined, making it possible for the web to understand
 and satisfy the requests of people and machines to use
 the web content

 (wikipedia)
The Frontier: Social
               Networking
!   Gartner predictions:
    !   By 2012 more than half the people we communicate with in
        our personal lives we will never have met face to face
    !   By 2012 Social Networking tools will have superseded eMail
        for personal communications

!   New developments: Google Wave, Twitter Lists, search from
    Google and Bing
!   Legal implications unclear – what Wave document is legal?

!   Targeted SN attacks – while the individual gives away
    information. Privacy – yesterday Google modified their
    dashboard to provide users with privacy controls
The Frontier: Man Machine
          Interface
!   Shift towards more natural interface, with implications
    for an “engaged network”
   !   Microsoft Surface
   !   Microsoft Natal
   !   Emotiv
   !   Nike Run

!   Information collection capabilities exceed our ability to
    manage the data about us (notwithstanding Google’s
    efforts)
The Frontier: Virtual Worlds
!   Virtual worlds most likely to evolve into business
    focused tools: Toyota, Wells Fargo, IBM, Cisco et al

!   Money laundering

!   Revenue streams: the hairdressers of the virtual world

!   Virtual worlds hint at a new reality: the intersection of
    technologies in which multiple personalities in
    multiple contexts become the norm.
The Frontier: Already Here
!   Service Oriented Architectures:
    !     Existing standards (WSS) address only part of the problem
    !     Consider the privacy issues surfaced by Google Street Level
          View
    !     Where does mashup liability reside


!   Cloud computing:
    !     Economics will drive IT into the cloud
    !     Publicized security failures already: companies will be driven
          to lower their guards in order to remain competitive.
A Risk-Based Progression




         Restrictions
Debate

Más contenido relacionado

La actualidad más candente

Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internetWilson Bright
 
What Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainWhat Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainSandy Palacios
 
What Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainWhat Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainLoyalCoin
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchLaVerne Kemp
 
The Future of Technology
The Future of TechnologyThe Future of Technology
The Future of TechnologyNovida Global
 
Web 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalWeb 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalNick Davis
 
Making GAFAs obsolete
Making GAFAs obsoleteMaking GAFAs obsolete
Making GAFAs obsoleteTristan Nitot
 
TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15Future Agenda
 
A scalable attribute based access control scheme with flexible delegation cum...
A scalable attribute based access control scheme with flexible delegation cum...A scalable attribute based access control scheme with flexible delegation cum...
A scalable attribute based access control scheme with flexible delegation cum...Shakas Technologies
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyHB Litigation Conferences
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computinglavanyamohan45
 
World Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportWorld Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportSergey Nazarov
 
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009Dr D.C. Misra
 
Mary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale
 
Open Government Open Innovation and the Cloud
Open Government Open Innovation and the CloudOpen Government Open Innovation and the Cloud
Open Government Open Innovation and the CloudMark Gayler
 
World Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainWorld Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainSergey Nazarov
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesEMC
 

La actualidad más candente (20)

Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internet
 
What Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainWhat Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the Blockchain
 
What Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the BlockchainWhat Do We Mine Next - Data Science and Mining on the Blockchain
What Do We Mine Next - Data Science and Mining on the Blockchain
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
Web 2.0 in Government
Web 2.0 in GovernmentWeb 2.0 in Government
Web 2.0 in Government
 
The Future of Technology
The Future of TechnologyThe Future of Technology
The Future of Technology
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Web 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalWeb 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest Final
 
Making GAFAs obsolete
Making GAFAs obsoleteMaking GAFAs obsolete
Making GAFAs obsolete
 
TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15
 
A scalable attribute based access control scheme with flexible delegation cum...
A scalable attribute based access control scheme with flexible delegation cum...A scalable attribute based access control scheme with flexible delegation cum...
A scalable attribute based access control scheme with flexible delegation cum...
 
IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
 
World Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportWorld Economic Forum Tipping Points Report
World Economic Forum Tipping Points Report
 
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009
Misra, D.C. (2009) Government 2.0_The Hype and the Reality_ 11.9.2009
 
Mary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for Cisco
 
Open Government Open Innovation and the Cloud
Open Government Open Innovation and the CloudOpen Government Open Innovation and the Cloud
Open Government Open Innovation and the Cloud
 
World Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainWorld Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point Blockchain
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United States
 

Destacado

Facebook security
Facebook securityFacebook security
Facebook securitySom Ath Ell
 
Facebook Security SMCMIDMO
Facebook Security SMCMIDMOFacebook Security SMCMIDMO
Facebook Security SMCMIDMOJerry Gamblin
 
Ti facebook security 150314
Ti   facebook security 150314Ti   facebook security 150314
Ti facebook security 150314Moses Ngeth
 
File Processing - Batch Process Execution
File Processing - Batch Process ExecutionFile Processing - Batch Process Execution
File Processing - Batch Process ExecutionAbimael Desales López
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Future Maritime Security Challenges: What to Expect and How To Prepare?
Future Maritime Security Challenges: What to Expect and How To Prepare?Future Maritime Security Challenges: What to Expect and How To Prepare?
Future Maritime Security Challenges: What to Expect and How To Prepare?Heiko Borchert
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Securityelianeycom
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Securitythaash95
 
History of cameras and photography for record
History of cameras and photography for recordHistory of cameras and photography for record
History of cameras and photography for recordwifeysarg
 
Raspberry-PI introduction
Raspberry-PI introductionRaspberry-PI introduction
Raspberry-PI introductionBasavaraj Sagar
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Introduction to raspberry pi
Introduction to raspberry piIntroduction to raspberry pi
Introduction to raspberry pipraveen_23
 
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das Databricks
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
History Of Photography Presentation
History Of Photography PresentationHistory Of Photography Presentation
History Of Photography PresentationStephen Torode
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategiessalman_zamzam
 

Destacado (20)

Facebook security
Facebook securityFacebook security
Facebook security
 
Facebook Security SMCMIDMO
Facebook Security SMCMIDMOFacebook Security SMCMIDMO
Facebook Security SMCMIDMO
 
Ti facebook security 150314
Ti   facebook security 150314Ti   facebook security 150314
Ti facebook security 150314
 
Session 2.2 Simon Milner
Session 2.2 Simon MilnerSession 2.2 Simon Milner
Session 2.2 Simon Milner
 
File Processing - Batch Process Execution
File Processing - Batch Process ExecutionFile Processing - Batch Process Execution
File Processing - Batch Process Execution
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Future Maritime Security Challenges: What to Expect and How To Prepare?
Future Maritime Security Challenges: What to Expect and How To Prepare?Future Maritime Security Challenges: What to Expect and How To Prepare?
Future Maritime Security Challenges: What to Expect and How To Prepare?
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Fruits apples
Fruits   applesFruits   apples
Fruits apples
 
History of cameras and photography for record
History of cameras and photography for recordHistory of cameras and photography for record
History of cameras and photography for record
 
Raspberry-PI introduction
Raspberry-PI introductionRaspberry-PI introduction
Raspberry-PI introduction
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Introduction to raspberry pi
Introduction to raspberry piIntroduction to raspberry pi
Introduction to raspberry pi
 
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das
Apache Spark 2.0: A Deep Dive Into Structured Streaming - by Tathagata Das
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
History Of Photography Presentation
History Of Photography PresentationHistory Of Photography Presentation
History Of Photography Presentation
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategies
 

Similar a A future security landscape

Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
Towards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsTowards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsVenkat Venkatraman
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnil Kumar
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterHillary Hartley
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Cloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianCloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianSanjay Chitnis
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challengesbaddi youssef
 
Conversational AI in Metaverse: The Future of Digital Interactions
Conversational AI in Metaverse: The Future of Digital InteractionsConversational AI in Metaverse: The Future of Digital Interactions
Conversational AI in Metaverse: The Future of Digital InteractionsRahulBansal965760
 
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...James Anderson
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]Hillary Hartley
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computingTarry Singh
 
Technology Through the Looking Glass: 2013-2020
Technology Through the Looking Glass: 2013-2020Technology Through the Looking Glass: 2013-2020
Technology Through the Looking Glass: 2013-2020Peter Crosby
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute247 Invest
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxAdvance Tech
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research
 

Similar a A future security landscape (20)

Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
Towards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsTowards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected Webs
 
Venkatraman five webs
Venkatraman five websVenkatraman five webs
Venkatraman five webs
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
DOR Futurecast
DOR FuturecastDOR Futurecast
DOR Futurecast
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutter
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Cloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianCloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The Indian
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Conversational AI in Metaverse: The Future of Digital Interactions
Conversational AI in Metaverse: The Future of Digital InteractionsConversational AI in Metaverse: The Future of Digital Interactions
Conversational AI in Metaverse: The Future of Digital Interactions
 
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...
GDG Cloud Southlake #15: Mihir Mistry: Cybersecurity and Data Privacy in an A...
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
 
Technology Through the Looking Glass: 2013-2020
Technology Through the Looking Glass: 2013-2020Technology Through the Looking Glass: 2013-2020
Technology Through the Looking Glass: 2013-2020
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Rxdxt Bbc Fmt
Rxdxt Bbc FmtRxdxt Bbc Fmt
Rxdxt Bbc Fmt
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
 

Más de Security B-Sides

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atlSecurity B-Sides
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c Security B-Sides
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Security B-Sides
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySecurity B-Sides
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonSecurity B-Sides
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity B-Sides
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...Security B-Sides
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineSecurity B-Sides
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsSecurity B-Sides
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldSecurity B-Sides
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?Security B-Sides
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceSecurity B-Sides
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Security B-Sides
 

Más de Security B-Sides (20)

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atl
 
The road to hell v0.6
The road to hell v0.6The road to hell v0.6
The road to hell v0.6
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex Hutton
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett Hardin
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource tools
 
2009 Zacon Haroon Meer
2009 Zacon  Haroon  Meer2009 Zacon  Haroon  Meer
2009 Zacon Haroon Meer
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the Gold
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Make Tea Not War
Make Tea Not WarMake Tea Not War
Make Tea Not War
 
OWASP Proxy
OWASP ProxyOWASP Proxy
OWASP Proxy
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)
 
Exploitation
ExploitationExploitation
Exploitation
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

A future security landscape

  • 1. Future Security ZACon Conference A Olivier anthony.desmond.olivier@gmail.com Twitter: anthonyolivier www.discussIT.co.za
  • 2. Opinions “We have had the same Information Security problems for 25 years. We still haven’t solved them” “For $200.000 dollars you can hire the hacking team that will crack anything. That’s less than the average American bank’s Anti Virus budget” “We are being overwhelmed by governance” “The complexity of new IT systems exceeds our capacities to secure them”
  • 3. The security cost curve? This is the security frontier Operations New Opportunity cost Process Process Process Data Data Data Applications Applications Applications Systems Systems Systems Perimeter Perimeter Perimeter
  • 4. `The Frontier: Semantic Web The Semantic Web is an evolving development of the World Wide Web in which the meaning (semantics) of information and services on the web is defined, making it possible for the web to understand and satisfy the requests of people and machines to use the web content (wikipedia)
  • 5. The Frontier: Social Networking !   Gartner predictions: !   By 2012 more than half the people we communicate with in our personal lives we will never have met face to face !   By 2012 Social Networking tools will have superseded eMail for personal communications !   New developments: Google Wave, Twitter Lists, search from Google and Bing !   Legal implications unclear – what Wave document is legal? !   Targeted SN attacks – while the individual gives away information. Privacy – yesterday Google modified their dashboard to provide users with privacy controls
  • 6. The Frontier: Man Machine Interface !   Shift towards more natural interface, with implications for an “engaged network” !   Microsoft Surface !   Microsoft Natal !   Emotiv !   Nike Run !   Information collection capabilities exceed our ability to manage the data about us (notwithstanding Google’s efforts)
  • 7. The Frontier: Virtual Worlds !   Virtual worlds most likely to evolve into business focused tools: Toyota, Wells Fargo, IBM, Cisco et al !   Money laundering !   Revenue streams: the hairdressers of the virtual world !   Virtual worlds hint at a new reality: the intersection of technologies in which multiple personalities in multiple contexts become the norm.
  • 8. The Frontier: Already Here !   Service Oriented Architectures: !   Existing standards (WSS) address only part of the problem !   Consider the privacy issues surfaced by Google Street Level View !   Where does mashup liability reside !   Cloud computing: !   Economics will drive IT into the cloud !   Publicized security failures already: companies will be driven to lower their guards in order to remain competitive.