SlideShare una empresa de Scribd logo
1 de 63
Descargar para leer sin conexión
Did you know?
Hacks Happen

Jeremiah Grossman
Founder  CTO WhiteHat Security




                                  1
First Book I Read on Website Security




                  “It is insufficient to protect ourselves
                  with laws; we need to protect ourselves
                  with mathematics. It's just not true.

                  Cryptography can't do any of that.”   :(
                                                             2
Did you know?




                3
By the End of 2008...



        17 million
      programmers
       worldwide
Writing 6,000 lines of code per year (each)



                                              4
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008

Más contenido relacionado

Destacado

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
Liz Allen
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
guest43929b
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
Paul Brown
 

Destacado (13)

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skills
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your House
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à Rêves
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
 
SERA Email 2.6.03
SERA Email 2.6.03SERA Email 2.6.03
SERA Email 2.6.03
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi Infotech
 
Managerial speeches
Managerial speechesManagerial speeches
Managerial speeches
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to Know
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 Campaign
 

Similar a Hack In The Box (Dubai) 04172008

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
 

Similar a Hack In The Box (Dubai) 04172008 (20)

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Malwares
MalwaresMalwares
Malwares
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
CYBER
CYBERCYBER
CYBER
 
News Bytes
News BytesNews Bytes
News Bytes
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotes
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Hack In The Box (Dubai) 04172008

  • 1. Did you know? Hacks Happen Jeremiah Grossman Founder CTO WhiteHat Security 1
  • 2. First Book I Read on Website Security “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. It's just not true. Cryptography can't do any of that.” :( 2
  • 4. By the End of 2008... 17 million programmers worldwide Writing 6,000 lines of code per year (each) 4