lady nerd laura safestack io https safestack io in this
play

@lady_nerd laura@safestack.io https://safestack.io In this talk - PowerPoint PPT Presentation

@lady_nerd laura@safestack.io https://safestack.io In this talk Fear and loathing Examining the root of fear and its effects Fear-based architecture and antipatterns Fear leads to anger, anger leads to hatred. Fearless security


  1. @lady_nerd laura@safestack.io https://safestack.io

  2. In this talk Fear and loathing Examining the root of fear and it’s effects Fear-based architecture and antipatterns Fear leads to anger, anger leads to hatred…. Fearless security patterns and approaches Deconstructing the scared and building the secure

  3. Fear and loathing

  4. Words Matter Threat Intelligence Kill Chain Advanced Persistent Threat Cyber War Zero-day Threat actor Firewall Brute-force Weaponized content

  5. The more scared we are The more scared we get

  6. In a nationally representative sample of Americans (fear increased risk estimates and plans for precautionary measures;

  7. Fight Flight Freeze

  8. Because these cues were associated with previous danger, the brain may see them as a predictor of threat.

  9. Fear-based architecture and antipatterns

  10. Castles

  11. Layered defences create an expectation of safety, managed by someone or something else.

  12. Defences can be challenged by Deployment Integrations Deconstruction Distribution

  13. Gatekeepers

  14. Gatekeepers place the responsibility on the user to prove that they are not malicious

  15. Innocent people try hard to be honest and incriminate themselves Malicious people follow the rules, don’t draw attention

  16. Scar Tissue

  17. Scar tissue is a defence that forms where we have previously been hurt

  18. Signs that your defence might be scar tissue Not-measurable Acute Useless Specific Exclusionary Arbitrary

  19. Fearless security patterns and approaches

  20. Castles Tiny Houses

  21. Small, simple and focused on functionality

  22. Small Frequently deployed Independent Monitored Consistent Assume failure Evaluated and updated

  23. Gatekeepers Guardians

  24. Guardians monitor and respond

  25. Honey pit: An intentional vulnerability in an application that traps an attacker Bermudez Honey pot: An intentionally vulnerable host in a network that alerts when attacked https://canary.tools

  26. Scar Tissue Intelligent Defences

  27. Be aware and challenge your own bubble

  28. Build defences that Focus on usability and accessibility Allow for monitoring and response Subject to regular evaluation

  29. TL;DR Fear and loathing Examining the root of fear and it’s effects Fear-based architecture and antipatterns Fear leads to anger, anger leads to hatred…. Fearless security patterns and approaches Deconstructing the scared and building the secure

  30. @lady_nerd laura@safestack.io https://safestack.io

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend