@lady_nerd laura@safestack.io https://safestack.io In this talk - - PowerPoint PPT Presentation

lady nerd laura safestack io https safestack io in this
SMART_READER_LITE
LIVE PREVIEW

@lady_nerd laura@safestack.io https://safestack.io In this talk - - PowerPoint PPT Presentation

@lady_nerd laura@safestack.io https://safestack.io In this talk Fear and loathing Examining the root of fear and its effects Fear-based architecture and antipatterns Fear leads to anger, anger leads to hatred. Fearless security


slide-1
SLIDE 1

@lady_nerd laura@safestack.io https://safestack.io

slide-2
SLIDE 2

In this talk

Fear and loathing

Examining the root of fear and it’s effects

Fear-based architecture and antipatterns

Fear leads to anger, anger leads to hatred….

Fearless security patterns and approaches

Deconstructing the scared and building the secure

slide-3
SLIDE 3

Fear and loathing

slide-4
SLIDE 4
slide-5
SLIDE 5

Words Matter Threat Intelligence Kill Chain Advanced Persistent Threat Cyber War Zero-day Threat actor Firewall Brute-force Weaponized content

slide-6
SLIDE 6

The more scared we are The more scared we get

slide-7
SLIDE 7

In a nationally representative sample of Americans (fear increased risk estimates and plans for precautionary measures;

slide-8
SLIDE 8
slide-9
SLIDE 9

Fight Flight Freeze

slide-10
SLIDE 10

Because these cues were associated with previous danger, the brain may see them as a predictor of threat.

slide-11
SLIDE 11

Fear-based architecture and antipatterns

slide-12
SLIDE 12

Castles

slide-13
SLIDE 13
slide-14
SLIDE 14

Layered defences create an expectation of safety, managed by someone or something else.

slide-15
SLIDE 15

Defences can be challenged by Deployment Integrations Deconstruction Distribution

slide-16
SLIDE 16

Gatekeepers

slide-17
SLIDE 17
slide-18
SLIDE 18

Gatekeepers place the responsibility

  • n the user to prove that they are not

malicious

slide-19
SLIDE 19

Innocent people try hard to be honest and incriminate themselves Malicious people follow the rules, don’t draw attention

slide-20
SLIDE 20
slide-21
SLIDE 21

Scar Tissue

slide-22
SLIDE 22
slide-23
SLIDE 23

Scar tissue is a defence that forms where we have previously been hurt

slide-24
SLIDE 24
slide-25
SLIDE 25

Signs that your defence might be scar tissue Not-measurable Acute Useless Specific Exclusionary Arbitrary

slide-26
SLIDE 26

Fearless security patterns and approaches

slide-27
SLIDE 27

Castles

Tiny Houses

slide-28
SLIDE 28

Small, simple and focused on functionality

slide-29
SLIDE 29
slide-30
SLIDE 30

Small Frequently deployed Independent Monitored Consistent Assume failure Evaluated and updated

slide-31
SLIDE 31

Gatekeepers

Guardians

slide-32
SLIDE 32

Guardians monitor and respond

slide-33
SLIDE 33
slide-34
SLIDE 34

Honey pit:

An intentional vulnerability in an application that traps an attacker

Bermudez

Honey pot:

An intentionally vulnerable host in a network that alerts when attacked

https://canary.tools

slide-35
SLIDE 35

Scar Tissue

Intelligent Defences

slide-36
SLIDE 36

Be aware and challenge your own bubble

slide-37
SLIDE 37

Build defences that Focus on usability and accessibility Allow for monitoring and response Subject to regular evaluation

slide-38
SLIDE 38
slide-39
SLIDE 39

TL;DR

Fear and loathing

Examining the root of fear and it’s effects

Fear-based architecture and antipatterns

Fear leads to anger, anger leads to hatred….

Fearless security patterns and approaches

Deconstructing the scared and building the secure

slide-40
SLIDE 40

@lady_nerd laura@safestack.io https://safestack.io