Securing the Insecure

21
Securing the Insecure Prabath Siriwardena Director of Security Architecture WSO2

description

Securing the Insecure - WSO2Con 2014 USA

Transcript of Securing the Insecure

Page 1: Securing the Insecure

Securing the Insecure

Prabath Siriwardena Director of Security Architecture

WSO2

Page 2: Securing the Insecure

Perception

Page 3: Securing the Insecure

Perception

Page 4: Securing the Insecure

Perception

Page 5: Securing the Insecure

Perception

Page 6: Securing the Insecure

Correctness

Page 7: Securing the Insecure

C-I-A

C-I-A

Confidentiality

Integrity

Availability

Page 8: Securing the Insecure

Attacks : RSA – March, 2011

Page 9: Securing the Insecure

Attacks : Adobe – October, 2013

Page 10: Securing the Insecure

Attacks : Target – November, 2013

Page 11: Securing the Insecure

The Weakest Link: Monoprix, France

Page 12: Securing the Insecure

The Defense in Depth: Los Angeles Airport

Page 13: Securing the Insecure

Insider Attacks: WikiLeaks, NSA

Page 14: Securing the Insecure

Insider Attacks: Cyber Insider Threat (CINDER)

Page 15: Securing the Insecure

Security by Obscurity: Microsoft NTLM

Page 16: Securing the Insecure

Software Security: Code is the Focus

Page 17: Securing the Insecure

Operating System Security

Page 18: Securing the Insecure

Firewalls and IDS

Page 19: Securing the Insecure

Heartbleed

Page 20: Securing the Insecure

Threat Modeling

Page 21: Securing the Insecure

Thank You