SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
SaaS - Security as a Service
                  ------
bullshit bingo … or just a future glimpse



                                  by Vitor Domingos
                           http://vitordomingos.com
Security History

1.0 – Computer

2.0 – Network

3.0 – Information


4.0 – Your digital you
Security Menace History

1.0 – Virus, Stealing Information

2.0 – Worms, Trojans, Virus

3.0 – DDoS, Trojans, Identity Theft


4.0 – FarmVille, Mafia Wars, Data Theft
Firewall History

1 Gen – Packet

2 Gen – Application Layer

3 Gen – Stateful


4 Gen – Semantic

5 Gen – Personal
security is about information
ring
          now    s ecu
security is about information
divide and conquer no longer applies
Security as a Service

- nothing new; more explicit

- managed security, rented security

- outsourcing security infrastructure > cloud

- auth management

- secure API's

- ongoing tasks (patch, scan, log, defend)
SaaS Meh's

- it's the web baby

- secure web gateways

- cloud security provider

- managed security 2.0

- trust

- bandwidth
it could work

- not with marketing bullshit

- XSS, data injection, data leak

- auth, weak password validation

- worm, trojan, bruteforce, DDoS

- secure not the browser, but the pipe

- social firewall ?
Vitor Domingos - vd@prt.sc

Más contenido relacionado

Destacado

Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceGeorge Fares
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedmounika k
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Javier Losa
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOCSolar Security
 

Destacado (6)

Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
 

Similar a Security As A Service

Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy againVitor Domingos
 
Confraria Security 17 June - Cloud Security
Confraria Security 17 June - Cloud SecurityConfraria Security 17 June - Cloud Security
Confraria Security 17 June - Cloud SecurityVitor Domingos
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based SecurityRob Levey
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdfDrysign By Exela
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security IntelligenceMetastore
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
bhumi verma  dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhsbhumi verma  dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhssarasdivyansh1608
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Brian Metzger
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportNominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportYuriy Yuzifovich
 

Similar a Security As A Service (20)

Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 
OneLogin Review
OneLogin ReviewOneLogin Review
OneLogin Review
 
Confraria Security 17 June - Cloud Security
Confraria Security 17 June - Cloud SecurityConfraria Security 17 June - Cloud Security
Confraria Security 17 June - Cloud Security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Sophos
SophosSophos
Sophos
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
bhumi verma  dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhsbhumi verma  dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportNominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
 

Más de Vitor Domingos

Methods Digital Away Day at Guildford - Cloud Computing
Methods Digital Away Day at Guildford - Cloud ComputingMethods Digital Away Day at Guildford - Cloud Computing
Methods Digital Away Day at Guildford - Cloud ComputingVitor Domingos
 
Harvardmd comunication
Harvardmd comunicationHarvardmd comunication
Harvardmd comunicationVitor Domingos
 
Failure the mother of all success
Failure the mother of all successFailure the mother of all success
Failure the mother of all successVitor Domingos
 
How to crunch data into beautiful graphics
How to crunch data into beautiful graphicsHow to crunch data into beautiful graphics
How to crunch data into beautiful graphicsVitor Domingos
 
Social Network Panorama
Social Network PanoramaSocial Network Panorama
Social Network PanoramaVitor Domingos
 
PT Google Technical User Group - Google TV
PT Google Technical User Group - Google TVPT Google Technical User Group - Google TV
PT Google Technical User Group - Google TVVitor Domingos
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityVitor Domingos
 
Portuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingPortuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingVitor Domingos
 
Products, Services or Platforms
Products, Services or PlatformsProducts, Services or Platforms
Products, Services or PlatformsVitor Domingos
 
AWS ground zero; EC2 & S3 hands-on
AWS ground zero; EC2 & S3 hands-onAWS ground zero; EC2 & S3 hands-on
AWS ground zero; EC2 & S3 hands-onVitor Domingos
 

Más de Vitor Domingos (14)

Methods Digital Away Day at Guildford - Cloud Computing
Methods Digital Away Day at Guildford - Cloud ComputingMethods Digital Away Day at Guildford - Cloud Computing
Methods Digital Away Day at Guildford - Cloud Computing
 
My experience
My experienceMy experience
My experience
 
Catolica EBP - Talk
Catolica EBP - TalkCatolica EBP - Talk
Catolica EBP - Talk
 
Harvardmd comunication
Harvardmd comunicationHarvardmd comunication
Harvardmd comunication
 
Failure the mother of all success
Failure the mother of all successFailure the mother of all success
Failure the mother of all success
 
How to crunch data into beautiful graphics
How to crunch data into beautiful graphicsHow to crunch data into beautiful graphics
How to crunch data into beautiful graphics
 
Social Network Panorama
Social Network PanoramaSocial Network Panorama
Social Network Panorama
 
PT Google Technical User Group - Google TV
PT Google Technical User Group - Google TVPT Google Technical User Group - Google TV
PT Google Technical User Group - Google TV
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
Portuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd MeetingPortuguese Cloud Computing Architects - 2nd Meeting
Portuguese Cloud Computing Architects - 2nd Meeting
 
Open Data
Open DataOpen Data
Open Data
 
handivi presentation
handivi presentationhandivi presentation
handivi presentation
 
Products, Services or Platforms
Products, Services or PlatformsProducts, Services or Platforms
Products, Services or Platforms
 
AWS ground zero; EC2 & S3 hands-on
AWS ground zero; EC2 & S3 hands-onAWS ground zero; EC2 & S3 hands-on
AWS ground zero; EC2 & S3 hands-on
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Security As A Service

  • 1. SaaS - Security as a Service ------ bullshit bingo … or just a future glimpse by Vitor Domingos http://vitordomingos.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Security History 1.0 – Computer 2.0 – Network 3.0 – Information 4.0 – Your digital you
  • 7. Security Menace History 1.0 – Virus, Stealing Information 2.0 – Worms, Trojans, Virus 3.0 – DDoS, Trojans, Identity Theft 4.0 – FarmVille, Mafia Wars, Data Theft
  • 8. Firewall History 1 Gen – Packet 2 Gen – Application Layer 3 Gen – Stateful 4 Gen – Semantic 5 Gen – Personal
  • 9. security is about information
  • 10. ring now s ecu security is about information
  • 11. divide and conquer no longer applies
  • 12.
  • 13. Security as a Service - nothing new; more explicit - managed security, rented security - outsourcing security infrastructure > cloud - auth management - secure API's - ongoing tasks (patch, scan, log, defend)
  • 14.
  • 15. SaaS Meh's - it's the web baby - secure web gateways - cloud security provider - managed security 2.0 - trust - bandwidth
  • 16.
  • 17. it could work - not with marketing bullshit - XSS, data injection, data leak - auth, weak password validation - worm, trojan, bruteforce, DDoS - secure not the browser, but the pipe - social firewall ?
  • 18.
  • 19.
  • 20.
  • 21. Vitor Domingos - vd@prt.sc