SlideShare una empresa de Scribd logo
1 de 24
Ok I’m here, so what’s in it for me? Charl van der Walt SensePost
Welcome
Technical Committee
No easy task
Thank you
2008 2007 2006 2009 2010
2006 2007 2008 2009 2010
2008 2007 2008 2009 2010
 
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Regulation Communication Measurement Formalization
Thank   You [email_address] [email_address] [email_address] [email_address]

Más contenido relacionado

Más de SensePost

Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Penetration testing and social engineering
Penetration testing and social engineeringPenetration testing and social engineering
Penetration testing and social engineeringSensePost
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceSensePost
 
The jar of joy
The jar of joyThe jar of joy
The jar of joySensePost
 

Más de SensePost (20)

Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Penetration testing and social engineering
Penetration testing and social engineeringPenetration testing and social engineering
Penetration testing and social engineering
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
The jar of joy
The jar of joyThe jar of joy
The jar of joy
 

Último

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

OK I'm here, so what's in it for me?

Notas del editor

  1. Good morning, than you for being here, and welcome again to the ITWeb Security Summit of 2010. This is the 5 th time this event is being staged and we are extremely excited about the three days that lie ahead of us.
  2. I represent the Security Summit “Technical Committee”. ITWeb has shown great integrity in their commitment to keeping the Security Summit at the forefront of both local and global trend. To achieve this we have enlisted a team of practitioners to assist us in planning for the event. This team's role is to advise us on theme, tracks, topics and speakers and, finally, to review and provide input on talks and papers. This is the second year that we’ve been involved in the conference in this capacity and we’d like to thank ITWeb, and thank you, for the privilege of being a part in this enriching and rewarding experience.
  3. An organization like ITWeb has to maintain a careful balance between delivering the content you want to hear, delivering the content you need to hear, and delivering the content the sponsors want you to hear. Maintaining this balance lead us from time-to-time into some degree of conflict with ITWeb, but in each case they have responded with integrity and fairness and firm commitment the quality of speakers and content this event has come to represent.
  4. We are extremely excited about the line-up of speakers at this year’s event.
  5. So, what has this conference come to represent. Well, we believe that over the next three day you will be exposed to as much high quality, relevant and objective information security content as you can expect to see at one place anywhere in the world. A brief look back into time at our visiting speakers alone illustrates this point very clearly. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  6. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  7. 2006: Kevin Mitnick Tom Scholtz (Gartner) 2007: Bruce Schneier 2008: Johnny Cache, Roberto Preatoni, Howard Schmidt Eugene Kaspersky David Litchfield Johnny Long 2009: Phil Zimmermann Jeremiah Grossman Tyler Moore Michael Dahn Adam Schostack Frank Artes ‘ The Grucq’ 2010: Joe Grande Jeremiah Felix (FX) Linder Moxie Marlinspike Charlie Miller Saumil Shah Dino Disovi Nitesh Dhanjani Alli Miller
  8. Joe Grande, is one of the world’s few hacker ‘celebrities’. He’s best known for the role he plays on the Discovery Channel series “Model This”, But he is also a respected veteran of our industry and one of the founding members of the L0pht Hacking crew back in the ‘90s. Joe reckons that over the last decade things have arguably gotten worse Hey points out that … The online presence of people, companies, and organizations has grown larger Users and vendors are not learning from history Many companies now involved in this industry selling security products that give us a false sense of security
  9. Moxie Marlinspike’s real passion is yachting. He stripped the paint off that old bastion of Internet security, SSL , He says he did it mostly to prove a point with Microsoft after something they did made him really, really, really mad.
  10. Here are some other people you don’t want to make mad… At the CanSecWest “pown2own” in April this year, Charlie Miller , Jake Honoroff , and Mark Daniel from Independent Security Evaluators have successfully compromised the Apple MacBook Air via a Safari 0day in "10 seconds". Charlie reckons he used one of 20 bugs he found, but there are probably 100's more...
  11. Dino Dai Zovi is mad already. In his talk in TRACK 1 on Wednesday he points out that Patching every security vulnerability and writing 100% bug-free code is impossible And that Even the advanced exploit mitigation techniques developed on exactly this premise , can now regularly be bypassed
  12. We all remember Jeremiah Grossman from last year. His keynote presentation is on the ‘ The Top Ten Hacks of the Year’ The 2010 WASC Statistics reort , to which his team contributed. Shows that M ore than 13% * of sites can be compromised completely automatically . About 49% of web applications contain vulnerabilities of high risk level 99% of web application are not compliant with PCI DSS standard requirements
  13. Ian deViilliers works for SenePost. He doesn’t get mad, he get’s even. Ian’s presentation is in TRACK 1 tomorrow. He points out that even securely-coded applications can be undermined by deployment on weak frameworks and platforms Ian will demonstrate some of the emerging techniques he’s using to cleave through the security of some very high-profile organizations using some very high-profile portal frameworks
  14. Some of other our local speakers would get mad if I didn’t mention their talks. Frans Lategan: Estimates only 1.7% of online banking users can adequately protect themselves online Tony Stephanou: Education does not effectively affect user behaviour Barry Irwin: Calculates that potentially > 70% of computers in in Africa are unpatched Tony Olivier (Helaine Leggat, Matt Erasmus) Change escalating You will always be behind the curve The next threat will come from an unexpected source
  15. Saumil Shah is presenting a little later this afternoon (he’s talk was postponed). He’s a grumpy guy at the best of times, and his flight was cancelled so I image he’s going to be even grumpier still. Saumil points out The web is fragile by design. The fundamental design weakness of HTTP allows thriving malware It’s 2010 what are we going to do about it?
  16. It’s a sad state of affairs really
  17. But as with with many clouds, this one has a silver lining and we’ve tried in this event to map out a path toward the proverbial pot of (security) gold. We believe that the journey to that pot of gold should take us through four major phases… Regulation Formulation Measurement and Communication
  18. Its is becoming increasingly apparent that without external pressure businesses are not willing to accept the cost of effective security programmes. As governments and other authoritative bodies step in to regulate industries that will not regulate themselves, we should carefully observe the impact of work like King III The Protection of Personal Information Act (PPIA) The Companies Act The new DoC “Cyber Policy” The PCI DSS And others. These regulations have the potential to significantly change our industry and the way we go about doing our work. Look out for the presentations by Helainne Legat Ritasha Jethva Bryce Thorold And others Most of which will be after lunch today in TRACK 1 & TRACK 2.
  19. Regulation must invariably force us into a formalization of our practice. In some areas such formalization is already quite common, but in others, like application development, its sadly still in its infancy. Security standards and formalization are extensively covered on day one, particularly in TRACK 1 and TRACK 2 after lunch. Look out for presentations by: Kris Budick on behald of Edcon David Volschenk & Justin Williams of E&Y But especially Paul and Theo from Thinksmart in TRACK 3 this afternoon And Allie Miller’s keynote this morning consistent security model for web services Dominique dHotman , Manager: Enterprise Architecture, Ooba     • The Ooba story: SOA deployment across many different business lines and application types • Practical advice on building WS-* compliant software across the board • How to connect with clients and/or business partners in a simple, secure and standards based fashion • How Ooba's development life-cycle ensures governance and consistent application
  20. The old adage says: “ Show me how you’ll measure me, I’ll tell you how I’ll perform” Formalization, if successful, will demand formal, objective and intelligent measure of outcomes, something that our industry has still not really been able to produce. The people of ‘securitymetrics.org’ – Andrew Jacquith, Adam Shostack and Brice Schneier (both of whom have spoken here in the past) have started building an invaluable body of work in this field. Tony Stephanou of T-Systems, who speaks in TRACK 1 today and will share valuable insights and experience that he has gained in his efforts to develop metrics and measure security.
  21. Finally (and this has been said often before) if security is to impact business then security has to learn to speak to business. In our opening keynote this morning Pat Pather of Standard Bank explores