SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
DON’T JUST STAND THERE – GRAB A BUCKET
THE INTERNET IS ON FIRE
This needs to change, or there is no sustainable, digital future.
THE INTERNET IS ON FIRE AND EVERY
CONNECTED DEVICE IS AT RISK
I’m calling every developer to pick up the proverbial bucket.
And if you deploy any kind of code, that includes you.
Yes, you.
THIS IS A CALL TO ARMS
| WHERE ARE WE?
Our technology is not optional anymore.
| WHERE ARE WE?
In the wake of the digitalization of everything and our rapid and greedy
adoption of new technology, criminals and spies have followed.
The internet, all our technology and the digitalized society is under constant
attack from criminals, spies and in some cases even our own governments.
The Internet is “on fire”, and every connected device – and user – is at risk.
This is a reality. It’s not up for discussion anymore.
| WHERE ARE WE?
We don’t know how many security incidents go undetected,
but the very realistic fear is that it may be a vast majority of them.
Of the detected incidents only 30 % were
detected by the targeted organization themselves.
Of these 30 %, a whopping 90 % were detected during exfiltration.
The average time of detection of an espionage incident is over 200 days.
| WHERE ARE WE?
There are typically at least 10 errors or defects in every 1 000 lines of code.
This can typically be reduced to less than 1 error or defect in every 1 000 lines
of production code after rigorous testing.
There is typically left 1 exploitable vulnerability per 1 000 000 lines of code.
Every year there are several severe and exploitable vulnerabilities in the
majority of popular software. The same seems to be true for hardware.
| WHERE ARE WE?
And yet, code now runs almost everything, everywhere.
There is hardly any aspect of life where we aren’t using modern IT technology.
To quote Melissa Hathaway: “We have put every critical system on the backbone
of the Internet, but the Internet wasn't ready for it.”
The proof is readily available. Every month you hear about major security
breaches with big consequences for people, companies and countries.
| WHERE ARE WE?
We’ve joined the party without proper protection.
| WHERE ARE WE?
The technological foundation of digitalized society is crumbling.
| HOW DID WE GET HERE?
By being lazy…
| HOW DID WE GET HERE?
By making wrongful assumtions…
| HOW DID WE GET HERE?
| HOW DID WE GET HERE?
| HOW DID WE GET HERE?
Conclusion: Only 3 % of all detected security incidents were detected
by the targeted organization themselves before it was to late.
Background: Badly written, badly deployed and badly configured code are
the enablers for a huge part of the avalanche of security
incidents we are currently experiencing.
Consequence: The vulnerabilities we introduce in code and IT infrastructure
are threatening our personal lives, our businesses, our
governments and in reality also our societies.
| WHERE ARE WE HEADING?
Towards the proverbial, digital cliff…?
| WHERE ARE WE HEADING?
You need to be aware of how terrible this technology is.
It is not protecting you.
This is not the safe version of the future you’ve seen on Star Trek.
This is the dirty ugly version of the future.
Everything is a bad neighborhood now.
– Dr. Paul Vixie
| WHERE ARE WE HEADING?
Possibly to a near future were we can’t trust our digital ground.
| HOW CAN WE AVOID THIS?
Customer demands.
Probably not until it’s “too late”…
Industry self-regulation and competition.
Few signs of that happening…
Laws and regulations.
Too little, too late – and probably not the way we’d want it…
| HOW CAN WE AVOID THIS?
But we can also do it bottom-up.
| HOW CAN WE AVOID THIS?
We can – and should – educate ourselves, and do better.
• Accept that your code will be deployed in ways you never imagined.
• Accept that absolutely all code you deploy will be attacked.
• Don’t assume that anyone else will mitigate vulnerabilities in your code.
• Don’t assume that exploiting your code will only affect your application.
• Accept that lives at some point will depend on the robustness of your code.
OUR SUSTAINABLE DIGITAL
FUTURE STARTS WITH YOU
DEPLOYING BETTER CODE
http://iamthecavalry.org/
@iamthecavalry
Go pick up a bucket
and say after me:
I’ll pitch in to fix it,
I am the Cavalry!
Be the Cavalry. Build more secure and robust systems even if no-one demands it.
We need a better and more
sustainable digital future, and the
world needs your contribution
SECURITY IS ALL ABOUT
SUSTAINABILITY
/presenter$ whoami
• Name: Frode Hommedal
• Homepage: http://frodehommedal.no/
• Twitter: @FrodeHommedal
• LinkedIn: https://no.linkedin.com/in/hommedal

Más contenido relacionado

La actualidad más candente

Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE - ATT&CKcon
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
MITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE - ATT&CKcon
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkGert-Jan Bruggink
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitn|u - The Open Security Community
 

La actualidad más candente (20)

Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
TiC
TiCTiC
TiC
 
Analogic Opsec 101
Analogic Opsec 101Analogic Opsec 101
Analogic Opsec 101
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
MITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - OctoberMITRE ATTACKcon Power Hour - October
MITRE ATTACKcon Power Hour - October
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploit
 

Similar a The Internet is on fire – don't just stand there, grab a bucket!

Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaGeorge Braga
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022CapRockTelephone
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 

Similar a The Internet is on fire – don't just stand there, grab a bucket! (20)

Security
SecuritySecurity
Security
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

The Internet is on fire – don't just stand there, grab a bucket!

  • 1. DON’T JUST STAND THERE – GRAB A BUCKET THE INTERNET IS ON FIRE
  • 2. This needs to change, or there is no sustainable, digital future. THE INTERNET IS ON FIRE AND EVERY CONNECTED DEVICE IS AT RISK
  • 3. I’m calling every developer to pick up the proverbial bucket. And if you deploy any kind of code, that includes you. Yes, you. THIS IS A CALL TO ARMS
  • 4. | WHERE ARE WE? Our technology is not optional anymore.
  • 5. | WHERE ARE WE? In the wake of the digitalization of everything and our rapid and greedy adoption of new technology, criminals and spies have followed. The internet, all our technology and the digitalized society is under constant attack from criminals, spies and in some cases even our own governments. The Internet is “on fire”, and every connected device – and user – is at risk. This is a reality. It’s not up for discussion anymore.
  • 6. | WHERE ARE WE? We don’t know how many security incidents go undetected, but the very realistic fear is that it may be a vast majority of them. Of the detected incidents only 30 % were detected by the targeted organization themselves. Of these 30 %, a whopping 90 % were detected during exfiltration. The average time of detection of an espionage incident is over 200 days.
  • 7. | WHERE ARE WE? There are typically at least 10 errors or defects in every 1 000 lines of code. This can typically be reduced to less than 1 error or defect in every 1 000 lines of production code after rigorous testing. There is typically left 1 exploitable vulnerability per 1 000 000 lines of code. Every year there are several severe and exploitable vulnerabilities in the majority of popular software. The same seems to be true for hardware.
  • 8. | WHERE ARE WE? And yet, code now runs almost everything, everywhere. There is hardly any aspect of life where we aren’t using modern IT technology. To quote Melissa Hathaway: “We have put every critical system on the backbone of the Internet, but the Internet wasn't ready for it.” The proof is readily available. Every month you hear about major security breaches with big consequences for people, companies and countries.
  • 9. | WHERE ARE WE? We’ve joined the party without proper protection.
  • 10. | WHERE ARE WE? The technological foundation of digitalized society is crumbling.
  • 11. | HOW DID WE GET HERE? By being lazy…
  • 12. | HOW DID WE GET HERE? By making wrongful assumtions…
  • 13. | HOW DID WE GET HERE?
  • 14. | HOW DID WE GET HERE?
  • 15. | HOW DID WE GET HERE? Conclusion: Only 3 % of all detected security incidents were detected by the targeted organization themselves before it was to late. Background: Badly written, badly deployed and badly configured code are the enablers for a huge part of the avalanche of security incidents we are currently experiencing. Consequence: The vulnerabilities we introduce in code and IT infrastructure are threatening our personal lives, our businesses, our governments and in reality also our societies.
  • 16. | WHERE ARE WE HEADING? Towards the proverbial, digital cliff…?
  • 17. | WHERE ARE WE HEADING? You need to be aware of how terrible this technology is. It is not protecting you. This is not the safe version of the future you’ve seen on Star Trek. This is the dirty ugly version of the future. Everything is a bad neighborhood now. – Dr. Paul Vixie
  • 18. | WHERE ARE WE HEADING? Possibly to a near future were we can’t trust our digital ground.
  • 19. | HOW CAN WE AVOID THIS? Customer demands. Probably not until it’s “too late”… Industry self-regulation and competition. Few signs of that happening… Laws and regulations. Too little, too late – and probably not the way we’d want it…
  • 20. | HOW CAN WE AVOID THIS? But we can also do it bottom-up.
  • 21. | HOW CAN WE AVOID THIS? We can – and should – educate ourselves, and do better.
  • 22. • Accept that your code will be deployed in ways you never imagined. • Accept that absolutely all code you deploy will be attacked. • Don’t assume that anyone else will mitigate vulnerabilities in your code. • Don’t assume that exploiting your code will only affect your application. • Accept that lives at some point will depend on the robustness of your code. OUR SUSTAINABLE DIGITAL FUTURE STARTS WITH YOU DEPLOYING BETTER CODE
  • 23. http://iamthecavalry.org/ @iamthecavalry Go pick up a bucket and say after me: I’ll pitch in to fix it, I am the Cavalry! Be the Cavalry. Build more secure and robust systems even if no-one demands it.
  • 24. We need a better and more sustainable digital future, and the world needs your contribution SECURITY IS ALL ABOUT SUSTAINABILITY
  • 25. /presenter$ whoami • Name: Frode Hommedal • Homepage: http://frodehommedal.no/ • Twitter: @FrodeHommedal • LinkedIn: https://no.linkedin.com/in/hommedal