SlideShare una empresa de Scribd logo
1 de 18
State of Bitcoin Security
Bojan Simic
@bojansimic @cryptosecurity
bojan@bitcoinsecurityproject.org
Bitcoin Security Project
When it comes to security….
Bitcoin Security Project
Remember the 5th of November
Bitcoin Security Project
Enigma Machine in WW2
Bitcoin Security Project
00000000
Bitcoin Security Project
Need a Debit Card?
Bitcoin Security Project
Internet Security
Target –
70,000,000 credit
card records
Adobe –
38,000,000 CC
numbers &
user accounts
American Business Hack
– 160,000,000 credit card
numbers and bank
accounts
SONY PSN –
77,000,000 User
Accounts
US Military –
76,000,000 SSNs of
Veterans
Top 4 hacks of 2013 resulted in 575 MILLION compromised accounts!
Bitcoin Security Project
Bitcoin (In)security
Bitcoin Savings
& Trust
Bitcoin Security Project
Why?
Bitcoin Security Project
Hackers are getting smarter, there’s more of them,
and there are more targets every day
91% of surveyed companies had a security incident in the last 12 months.
Bitcoin Security Project
So what can you do about it?
Bitcoin Security Project
The average security breach costs $50,000 – $650,000
Security
Policy
Physical
Security
Secure
Storage
Application
Security
Manage
Access
Network
Security
Internal
Security
Bitcoin Security Project
Hire or train developers qualified in security
18.8%
77.0%
70.0%
30.0%
55.0%
40.0%
51.0%
61.0%
69.0%
24.0%
Protecting Sensitive Data
Preventing Injection Attacks
Preventing XSS
Access Control Strategy
Business Function Access Control
Data Layer Access Control
Securing User Sessions
Managing Identities in Apps
Using SSL
Threat Modeling for Apps
Developer’s Scores
Companies that train developers in security have 73% less vulnerabilities
Bitcoin Security Project
Store your bitcoins securely!
Paper Wallet
COLD STORAGE!
Smaller businesses are victims of cyber crimes more often than big firms
Bitcoin Security Project
Encrypt EVERYTHING!
• Transactions
• Passwords
• SSNs
• Addresses
• Images
• Credit Cards
• DOB
• Other PII…
73% of Americans have been victims of a cyber security crime
Bitcoin Security Project
Take advantage of free resources & tools
Bitcoin Security Project
Start a security bug bounty!
Fixing a security vulnerability post-release costs 30X more than in dev
Bitcoin Security Project
(Donations)
• Follow @cryptosecurity
• Sign up at bitcoinsecurityproject.org
• bojan@bitcoinsecurityproject.org

Más contenido relacionado

La actualidad más candente

AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
Satnam Singh
 
Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
Fernando Romero
 

La actualidad más candente (20)

Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...
 
180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1
 
Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siegeMeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
 
Building Smarter Solutions Using Azure and Cognitive Services - IT Pro Dev Co...
Building Smarter Solutions Using Azure and Cognitive Services - IT Pro Dev Co...Building Smarter Solutions Using Azure and Cognitive Services - IT Pro Dev Co...
Building Smarter Solutions Using Azure and Cognitive Services - IT Pro Dev Co...
 
Keys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudKeys To Better Data Security In the Cloud
Keys To Better Data Security In the Cloud
 
When governance lacks compliance
When governance lacks complianceWhen governance lacks compliance
When governance lacks compliance
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 

Destacado

AEMPS Clinical Trials Teleportal training course mute
AEMPS Clinical Trials Teleportal training course muteAEMPS Clinical Trials Teleportal training course mute
AEMPS Clinical Trials Teleportal training course mute
Alta Tecnología y Educación
 
Pla d'operacions
Pla d'operacionsPla d'operacions
Pla d'operacions
SaraLlop27
 
Plafinancer i economic fast and go
Plafinancer i economic fast and goPlafinancer i economic fast and go
Plafinancer i economic fast and go
SaraLlop27
 
Fast goplafinancerieconomic
Fast goplafinancerieconomicFast goplafinancerieconomic
Fast goplafinancerieconomic
SaraLlop27
 

Destacado (20)

AEMPS Clinical Trials Teleportal training course mute
AEMPS Clinical Trials Teleportal training course muteAEMPS Clinical Trials Teleportal training course mute
AEMPS Clinical Trials Teleportal training course mute
 
Pla d'operacions
Pla d'operacionsPla d'operacions
Pla d'operacions
 
Presentation1
Presentation1Presentation1
Presentation1
 
Plafinancer i economic fast and go
Plafinancer i economic fast and goPlafinancer i economic fast and go
Plafinancer i economic fast and go
 
E-commerce
E-commerce E-commerce
E-commerce
 
7 grzechów e-commerce
7 grzechów e-commerce7 grzechów e-commerce
7 grzechów e-commerce
 
Disfruta de Coruña
Disfruta de CoruñaDisfruta de Coruña
Disfruta de Coruña
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer concepts
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Proyecto Fin de Carrera
Proyecto Fin de CarreraProyecto Fin de Carrera
Proyecto Fin de Carrera
 
Levenslijn
LevenslijnLevenslijn
Levenslijn
 
Herman Wildenvey
Herman WildenveyHerman Wildenvey
Herman Wildenvey
 
Parveer mahal
Parveer mahalParveer mahal
Parveer mahal
 
DBMS
DBMSDBMS
DBMS
 
Levenslijn
LevenslijnLevenslijn
Levenslijn
 
Java
JavaJava
Java
 
Fast goplafinancerieconomic
Fast goplafinancerieconomicFast goplafinancerieconomic
Fast goplafinancerieconomic
 
H LAUNCH
H LAUNCHH LAUNCH
H LAUNCH
 
4 narzędzia do synchronizacji plików w firmie
4 narzędzia do synchronizacji plików w firmie4 narzędzia do synchronizacji plików w firmie
4 narzędzia do synchronizacji plików w firmie
 
Networking
NetworkingNetworking
Networking
 

Similar a State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic

Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Youngjun Chang
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
Ulf Mattsson
 

Similar a State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic (20)

BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
5 Reasons Why Blockchain is a Financial Services Game Changer
5 Reasons Why Blockchain is a Financial Services Game Changer5 Reasons Why Blockchain is a Financial Services Game Changer
5 Reasons Why Blockchain is a Financial Services Game Changer
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
 
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
Web3 Security Outlook 2022-2023
Web3 Security Outlook 2022-2023Web3 Security Outlook 2022-2023
Web3 Security Outlook 2022-2023
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Future of software developers 09
Future of software developers 09Future of software developers 09
Future of software developers 09
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic