Главная
Study mode:
on
1
Intro
2
Background
3
Information Security
4
Chest vs Poker
5
Common Sense
6
Cyber Civilians
7
State of the Art
8
Technical Debt
9
COBOL
10
Trusted Computing Base
11
Face Dancer
12
LowLevel Attacks
13
SteppingPants
14
LegBack
15
ShadowWalker
16
Paging and Virtual Memory
17
Map in Physical Memory
18
Virtual Addresses
19
ECAM
20
Page Directory Entry
21
The best part
22
Scratchpad data
23
Alignment caveats
24
Design flaws
25
New features
26
Lazy attackers
27
Youre going to be rich
28
Youre game over
29
Google Apps for government
30
The least privileged principle
31
Trust of unknown entities
32
How do you communicate security
33
Holistic view of threats
34
Who is that actually harming
35
Selfish goal
36
Low hanging fruit attacker
37
Advanced persistent targeted threat
38
How to stand out
39
Segmentation
40
Competitors
41
KPIs
42
Data Liability
43
Predict Costs
44
Balance Security Usability Support
45
Information Security Debt
46
Stop Patching
47
Model Your Risk
48
Return on Investment
49
Worst Examples of Security
50
OS X Security
Description:
Explore a conference talk that delves into the critical issues plaguing modern information security infrastructure. Examine the foundations of cybersecurity, from common sense approaches to the state-of-the-art technologies. Investigate technical debt, low-level attacks, and design flaws in trusted computing bases. Learn about virtual memory, paging, and potential vulnerabilities in these systems. Discuss the challenges of communicating security concerns, balancing security with usability, and managing information security debt. Analyze the concept of risk modeling and return on investment in cybersecurity. Gain insights into worst-case security scenarios and examine OS X security as a case study.

The Foundation Is Rotting and the Basement Is Flooding

WEareTROOPERS
Add to list
0:00 / 0:00