SlideShare una empresa de Scribd logo
1 de 24
Ok I’m here, so what’s in it for me? Charl van der Walt SensePost
Welcome
Technical Committee
No easy task
Thank you
2008 2007 2006 2009 2010
2006 2007 2008 2009 2010
2008 2007 2008 2009 2010
 
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Thank   You [email_address] [email_address] [email_address] [email_address]

Más contenido relacionado

Más de SensePost

Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Penetration testing and social engineering
Penetration testing and social engineeringPenetration testing and social engineering
Penetration testing and social engineeringSensePost
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceSensePost
 
The jar of joy
The jar of joyThe jar of joy
The jar of joySensePost
 

Más de SensePost (20)

Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Penetration testing and social engineering
Penetration testing and social engineeringPenetration testing and social engineering
Penetration testing and social engineering
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
The jar of joy
The jar of joyThe jar of joy
The jar of joy
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

OK I'm here, so what's in it for me?

Notas del editor

  1. Good morning, than you for being here, and welcome again to the ITWeb Security Summit of 2010. This is the 5 th time this event is being staged and we are extremely excited about the three days that lie ahead of us.
  2. I represent the Security Summit “Technical Committee”. ITWeb has shown great integrity in their commitment to keeping the Security Summit at the forefront of both local and global trend. To achieve this we have enlisted a team of practitioners to assist us in planning for the event. This team's role is to advise us on theme, tracks, topics and speakers and, finally, to review and provide input on talks and papers. This is the second year that we’ve been involved in the conference in this capacity and we’d like to thank ITWeb, and thank you, for the privilege of being a part in this enriching and rewarding experience.
  3. An organization like ITWeb has to maintain a careful balance between delivering the content you want to hear, delivering the content you need to hear, and delivering the content the sponsors want you to hear. Maintaining this balance lead us from time-to-time into some degree of conflict with ITWeb, but in each case they have responded with integrity and fairness and firm commitment the quality of speakers and content this event has come to represent.
  4. We are extremely excited about the line-up of speakers at this year’s event.
  5. So, what has this conference come to represent. Well, we believe that over the next three day you will be exposed to as much high quality, relevant and objective information security content as you can expect to see at one place anywhere in the world. A brief look back into time at our visiting speakers alone illustrates this point very clearly. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  6. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  7. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  8. Joe Grande, is one of the world’s few hacker ‘celebrities’. He’s best known for the role he plays on the Discovery Channel series “Model This”, But he is also a respected veteran of our industry and one of the founding members of the L0pht Hacking crew back in the ‘90s. Joe reckons that over the last decade things have arguably gotten worse Hey points out that … The online presence of people, companies, and organizations has grown larger Users and vendors are not learning from history Many companies now involved in this industry selling security products that give us a false sense of security
  9. Moxie Marlinspike’s real passion is yachting. He stripped the paint off that old bastion of Internet security, SSL , He says he did it mostly to prove a point with Microsoft after something they did made him really, really, really mad.
  10. Here are some other people you don’t want to make mad… At the CanSecWest “pown2own” in April this year, Charlie Miller , Jake Honoroff , and Mark Daniel from Independent Security Evaluators have successfully compromised the Apple MacBook Air via a Safari 0day in "10 seconds". Charlie reckons he used one of 20 bugs he found, but there are probably 100's more...
  11. Dino Dai Zovi is mad already. In his talk in TRACK 1 on Wednesday he points out that Patching every security vulnerability and writing 100% bug-free code is impossible And that Even the advanced exploit mitigation techniques developed on exactly this premise , can now regularly be bypassed
  12. We all remember Jeremiah Grossman from last year. His keynote presentation is on the ‘ The Top Ten Hacks of the Year’ The 2010 WASC Statistics reort , to which his team contributed. Shows that M ore than 13% * of sites can be compromised completely automatically . About 49% of web applications contain vulnerabilities of high risk level 99% of web application are not compliant with PCI DSS standard requirements
  13. Ian deViilliers works for SenePost. He doesn’t get mad, he get’s even. Ian’s presentation is in TRACK 1 tomorrow. He points out that even securely-coded applications can be undermined by deployment on weak frameworks and platforms Ian will demonstrate some of the emerging techniques he’s using to cleave through the security of some very high-profile organizations using some very high-profile portal frameworks
  14. Some of other our local speakers would get mad if I didn’t mention their talks. Frans Lategan: Estimates only 1.7% of online banking users can adequately protect themselves online Tony Stephanou: Education does not effectively affect user behaviour Barry Irwin: Calculates that potentially > 70% of computers in in Africa are unpatched Tony Olivier (Helaine Leggat, Matt Erasmus) Change escalating You will always be behind the curve The next threat will come from an unexpected source
  15. Saumil Shah is presenting a little later this afternoon (he’s talk was postponed). He’s a grumpy guy at the best of times, and his flight was cancelled so I image he’s going to be even grumpier still. Saumil points out The web is fragile by design. The fundamental design weakness of HTTP allows thriving malware It’s 2010 what are we going to do about it?
  16. It’s a sad state of affairs really
  17. But as with with many clouds, this one has a silver lining and we’ve tried in this event to map out a path toward the proverbial pot of (security) gold. We believe that the journey to that pot of gold should take us through four major phases… Regulation Formulation Measurement and Communication
  18. Its is becoming increasingly apparent that without external pressure businesses are not willing to accept the cost of effective security programmes. As governments and other authoritative bodies step in to regulate industries that will not regulate themselves, we should carefully observe the impact of work like King III The Protection of Personal Information Act (PPIA) The Companies Act The new DoC “Cyber Policy” The PCI DSS And others. These regulations have the potential to significantly change our industry and the way we go about doing our work. Look out for the presentations by Helainne Legat Ritasha Jethva Bryce Thorold And others Most of which will be after lunch today in TRACK 1 & TRACK 2.
  19. Regulation must invariably force us into a formalization of our practice. In some areas such formalization is already quite common, but in others, like application development, its sadly still in its infancy. Security standards and formalization are extensively covered on day one, particularly in TRACK 1 and TRACK 2 after lunch. Look out for presentations by: Kris Budick on behald of Edcon David Volschenk & Justin Williams of E&Y But especially Paul and Theo from Thinksmart in TRACK 3 this afternoon And Allie Miller’s keynote this morning consistent security model for web services Dominique dHotman , Manager: Enterprise Architecture, Ooba     • The Ooba story: SOA deployment across many different business lines and application types • Practical advice on building WS-* compliant software across the board • How to connect with clients and/or business partners in a simple, secure and standards based fashion • How Ooba's development life-cycle ensures governance and consistent application
  20. The old adage says: “ Show me how you’ll measure me, I’ll tell you how I’ll perform” Formalization, if successful, will demand formal, objective and intelligent measure of outcomes, something that our industry has still not really been able to produce. The people of ‘securitymetrics.org’ – Andrew Jacquith, Adam Shostack and Brice Schneier (both of whom have spoken here in the past) have started building an invaluable body of work in this field. Tony Stephanou of T-Systems, who speaks in TRACK 1 today and will share valuable insights and experience that he has gained in his efforts to develop metrics and measure security.
  21. Finally (and this has been said often before) if security is to impact business then security has to learn to speak to business. In our opening keynote this morning Pat Pather of Standard Bank explores