SlideShare a Scribd company logo
1 of 79
Security Heretic:
We’re Doing It Wrong
    James Arlen aka Myrcurial
          SecTor 2008
        October 8, 2008
Hi.




2008-10-08   Security Heretic: We're Doing It Wrong   2
Great title huh?




2008-10-08     Security Heretic: We're Doing It Wrong   3
Disclaimer:

I am actively employed in the Infosec
   industry, but not authorized to speak on
   behalf of my employer.




2008-10-08      Security Heretic: We're Doing It Wrong   4
Disclaimer:

I am actively* employed in the Infosec
   industry, but not authorized to speak on
   behalf of my employer.




                                                         * (I hope…)
2008-10-08      Security Heretic: We're Doing It Wrong             5
Disclaimer (2):

I am going to say some startling things.
   There are no sacred entities when the
   heretic starts ranting.




2008-10-08        Security Heretic: We're Doing It Wrong   6
Disclaimer (3):

If you are easily offended, you might want
   to get yourself a cool compress or some
   sort of smelling salts, it’s going to be a
   stressful hour.




2008-10-08        Security Heretic: We're Doing It Wrong   7
Heretic

Her"e*tic, n. [L. haereticus, Gr. ? able to choose, heretical, fr. ? to
     take, choose: cf. F. h['e]r['e]tique. See Heresy.]


1. One who holds to a heresy; one who
   believes some doctrine contrary to the
   established faith or prevailing religion.

                                    Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.



2008-10-08                  Security Heretic: We're Doing It Wrong                                  8
I’m tired of looking silly.




2008-10-08          Security Heretic: We're Doing It Wrong   9
2008-10-08   Security Heretic: We're Doing It Wrong   10
Really tired.



2008-10-08   Security Heretic: We're Doing It Wrong   11
Security “Industry” =




2008-10-08         Security Heretic: We're Doing It Wrong   12
We can change that.




2008-10-08     Security Heretic: We're Doing It Wrong   13
We can change that. We can fix that.




2008-10-08     Security Heretic: We're Doing It Wrong   14
We can change that. We can fix that.



             But it’s going to really irritate people.



2008-10-08               Security Heretic: We're Doing It Wrong   15
We can change that. We can fix that.



             But it’s going to really irritate people.

                                                                  In a good way.
2008-10-08               Security Heretic: We're Doing It Wrong                16
The Past




2008-10-08              Security Heretic: We're Doing It Wrong   17
"Those that fail to learn
  from history, are
  doomed to repeat it."

             - Winston Churchill




2008-10-08                Security Heretic: We're Doing It Wrong   18
Information Security

» Confidentiality
» Integrity
» Availability




2008-10-08      Security Heretic: We're Doing It Wrong   19
Julius Caesar: Mr.
           Confidentiality




2008-10-08               Security Heretic: We're Doing It Wrong   20
Sumer: Integrity




2008-10-08                 Security Heretic: We're Doing It Wrong   21
Jewish Scribes:
               Availability




2008-10-08                 Security Heretic: We're Doing It Wrong   22
»     Guilds
»     Seals
»     Obfuscation
»     Physical security




2008-10-08           Security Heretic: We're Doing It Wrong   23
Computer Security




2008-10-08     Security Heretic: We're Doing It Wrong   24
»     Theories
»     1970s
»     Multics
»     US Military
»     Cambridge University
»     Research Microkernels



2008-10-08         Security Heretic: We're Doing It Wrong   25
The Religion




2008-10-08                  Security Heretic: We're Doing It Wrong   26
Religion

Re*li"gion (r[-e]*l[i^]j"[u^]n), n. [F., from L. religio; cf. religens pious,
   revering the gods, Gr. 'ale`gein to heed, have a care. Cf. Neglect.]


4. Strictness of fidelity in conforming to
  any practice, as if it were an enjoined
  rule of conduct. [R.]

                                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.

2008-10-08                      Security Heretic: We're Doing It Wrong                                 27
Best Practices




2008-10-08    Security Heretic: We're Doing It Wrong   28
Common Practices




2008-10-08      Security Heretic: We're Doing It Wrong   29
Habitual Responses




2008-10-08      Security Heretic: We're Doing It Wrong   30
Insanity: doing the
  same thing over and
  over again and
  expecting different
  results.

             - Albert Einstein



2008-10-08              Security Heretic: We're Doing It Wrong   31
2008-10-08   Security Heretic: We're Doing It Wrong   32
2008-10-08   Security Heretic: We're Doing It Wrong   33
Proselytize

Pros"e*ly*tize, v. t. [imp. & p. p. proselytized; p. pr. & vb. n.
   Proselytizing.]


To convert to some religion, system,
 opinion, or the like; to bring, or cause to
 come, over; to proselyte.

                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.


2008-10-08                  Security Heretic: We're Doing It Wrong                     34
2008-10-08   Security Heretic: We're Doing It Wrong   35
2008-10-08   Security Heretic: We're Doing It Wrong   36
2008-10-08   Security Heretic: We're Doing It Wrong   37
2008-10-08   Security Heretic: We're Doing It Wrong   38
2008-10-08   Security Heretic: We're Doing It Wrong   39
2008-10-08   Security Heretic: We're Doing It Wrong   40
2008-10-08   Security Heretic: We're Doing It Wrong   41
How many CPE hours will you gain for
                  questioning your religion?




2008-10-08               Security Heretic: We're Doing It Wrong   42
2008-10-08   Security Heretic: We're Doing It Wrong   43
2008-10-08   Security Heretic: We're Doing It Wrong   44
Actually, I’m claiming this presentation as
                   CPE hours.

               You should too.



2008-10-08       Security Heretic: We're Doing It Wrong   45
Sshhhhh…

             Maybe they won’t notice the topic.




2008-10-08              Security Heretic: We're Doing It Wrong   46
The Vendors




2008-10-08   Security Heretic: We're Doing It Wrong   47
Professional Services




2008-10-08           Security Heretic: We're Doing It Wrong   48
Hardware and Software




2008-10-08      Security Heretic: We're Doing It Wrong   49
Pundits and the Media




2008-10-08         Security Heretic: We're Doing It Wrong   50
The Dogma




2008-10-08               Security Heretic: We're Doing It Wrong   51
Dogma

Dog"ma, n.; pl. E. Dogmas, L. Dogmata. [L. dogma, Gr. ?, pl. ?, fr. ?
  to think, seem, appear; akin to L. decet it is becoming. Cf.
  Decent.]


3. A doctrinal notion asserted without
  regard to evidence or truth; an arbitrary
  dictum.
                                   Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.


2008-10-08                 Security Heretic: We're Doing It Wrong                                 52
The iPod Data Thief




2008-10-08        Security Heretic: We're Doing It Wrong   53
The Complex Password




2008-10-08      Security Heretic: We're Doing It Wrong   54
“Blood on the Walls”
  Metrics




2008-10-08        Security Heretic: We're Doing It Wrong   55
The answer is “No”




2008-10-08       Security Heretic: We're Doing It Wrong   56
No Personal Use




2008-10-08        Security Heretic: We're Doing It Wrong   57
I’m only responsible for
  logical security




2008-10-08         Security Heretic: We're Doing It Wrong   58
The Renaissance




2008-10-08          Security Heretic: We're Doing It Wrong   59
Individual Contributions




2008-10-08         Security Heretic: We're Doing It Wrong   60
Research and Development




2008-10-08          Security Heretic: We're Doing It Wrong   61
Synthesis

Syn"the*sis, n.; pl. Syntheses. [L., a mixture, properly, a putting
   together, Gr. ?, fr. ? to place or put together; sy`n with + ? to
   place. See Thesis.]


3. (Logic) The combination of separate elements
  of thought into a whole, as of simple into
  complex conceptions, species into genera,
  individual propositions into systems; -- the
  opposite of analysis.

                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.

2008-10-08                  Security Heretic: We're Doing It Wrong                     62
Enlightenment




2008-10-08    Security Heretic: We're Doing It Wrong   63
The Ninety-Five Theses




2008-10-08        Security Heretic: We're Doing It Wrong   64
The Twelve Step
                  Program




2008-10-08                Security Heretic: We're Doing It Wrong   65
Reduced to 9 steps for irony.




2008-10-08            Security Heretic: We're Doing It Wrong   66
1. Admitting the problem.




2008-10-08          Security Heretic: We're Doing It Wrong   67
2. Admitting our complicity.




2008-10-08           Security Heretic: We're Doing It Wrong   68
3. Reasserting ethics.




2008-10-08        Security Heretic: We're Doing It Wrong   69
4. Regaining our self-respect.




2008-10-08            Security Heretic: We're Doing It Wrong   70
5. Finding a new path.




2008-10-08        Security Heretic: We're Doing It Wrong   71
6. Eating our own dog-food.




2008-10-08           Security Heretic: We're Doing It Wrong   72
7. Re-discovering passion.




2008-10-08          Security Heretic: We're Doing It Wrong   73
8. Communicating for success.




2008-10-08            Security Heretic: We're Doing It Wrong   74
9. Owning the suck.




2008-10-08       Security Heretic: We're Doing It Wrong   75
NOT: Pwning          teh 5uC|<0rz.




2008-10-08        Security Heretic: We're Doing It Wrong   76
That’s a different talk altogether.




2008-10-08              Security Heretic: We're Doing It Wrong   77
Q&A



             followup: myrcurial@100percentgeek.net


2008-10-08               Security Heretic: We're Doing It Wrong   78
Credits, Links and Notices.
Me:           http://myrcurial.com and
              http://www.linkedin.com/in/jamesarlen and sometimes
              http://liquidmatrix.org/blog

Thanks: My Family, Friends, and the SecTor Advisory Committee.

Sources: notations and copies of materials are embedded within
   “notes” of the PPT file.

Inspiration: coffee, omelets made by my lovely wife, Strattera, Club
   Mate, Information Society, NIN, altruism.

Constructed with: Asus eeePC 701, Firefox, Powerpoint, angst.


http://creativecommons.org/licenses/by-nc-sa/2.5/ca/
2008-10-08                                       Security Heretic: We're Doing It Wrong   79

More Related Content

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SecTor 2008 - Security Heretic: We're Doing It Wrong

  • 1. Security Heretic: We’re Doing It Wrong James Arlen aka Myrcurial SecTor 2008 October 8, 2008
  • 2. Hi. 2008-10-08 Security Heretic: We're Doing It Wrong 2
  • 3. Great title huh? 2008-10-08 Security Heretic: We're Doing It Wrong 3
  • 4. Disclaimer: I am actively employed in the Infosec industry, but not authorized to speak on behalf of my employer. 2008-10-08 Security Heretic: We're Doing It Wrong 4
  • 5. Disclaimer: I am actively* employed in the Infosec industry, but not authorized to speak on behalf of my employer. * (I hope…) 2008-10-08 Security Heretic: We're Doing It Wrong 5
  • 6. Disclaimer (2): I am going to say some startling things. There are no sacred entities when the heretic starts ranting. 2008-10-08 Security Heretic: We're Doing It Wrong 6
  • 7. Disclaimer (3): If you are easily offended, you might want to get yourself a cool compress or some sort of smelling salts, it’s going to be a stressful hour. 2008-10-08 Security Heretic: We're Doing It Wrong 7
  • 8. Heretic Her"e*tic, n. [L. haereticus, Gr. ? able to choose, heretical, fr. ? to take, choose: cf. F. h['e]r['e]tique. See Heresy.] 1. One who holds to a heresy; one who believes some doctrine contrary to the established faith or prevailing religion. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 8
  • 9. I’m tired of looking silly. 2008-10-08 Security Heretic: We're Doing It Wrong 9
  • 10. 2008-10-08 Security Heretic: We're Doing It Wrong 10
  • 11. Really tired. 2008-10-08 Security Heretic: We're Doing It Wrong 11
  • 12. Security “Industry” = 2008-10-08 Security Heretic: We're Doing It Wrong 12
  • 13. We can change that. 2008-10-08 Security Heretic: We're Doing It Wrong 13
  • 14. We can change that. We can fix that. 2008-10-08 Security Heretic: We're Doing It Wrong 14
  • 15. We can change that. We can fix that. But it’s going to really irritate people. 2008-10-08 Security Heretic: We're Doing It Wrong 15
  • 16. We can change that. We can fix that. But it’s going to really irritate people. In a good way. 2008-10-08 Security Heretic: We're Doing It Wrong 16
  • 17. The Past 2008-10-08 Security Heretic: We're Doing It Wrong 17
  • 18. "Those that fail to learn from history, are doomed to repeat it." - Winston Churchill 2008-10-08 Security Heretic: We're Doing It Wrong 18
  • 19. Information Security » Confidentiality » Integrity » Availability 2008-10-08 Security Heretic: We're Doing It Wrong 19
  • 20. Julius Caesar: Mr. Confidentiality 2008-10-08 Security Heretic: We're Doing It Wrong 20
  • 21. Sumer: Integrity 2008-10-08 Security Heretic: We're Doing It Wrong 21
  • 22. Jewish Scribes: Availability 2008-10-08 Security Heretic: We're Doing It Wrong 22
  • 23. » Guilds » Seals » Obfuscation » Physical security 2008-10-08 Security Heretic: We're Doing It Wrong 23
  • 24. Computer Security 2008-10-08 Security Heretic: We're Doing It Wrong 24
  • 25. » Theories » 1970s » Multics » US Military » Cambridge University » Research Microkernels 2008-10-08 Security Heretic: We're Doing It Wrong 25
  • 26. The Religion 2008-10-08 Security Heretic: We're Doing It Wrong 26
  • 27. Religion Re*li"gion (r[-e]*l[i^]j"[u^]n), n. [F., from L. religio; cf. religens pious, revering the gods, Gr. 'ale`gein to heed, have a care. Cf. Neglect.] 4. Strictness of fidelity in conforming to any practice, as if it were an enjoined rule of conduct. [R.] Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 27
  • 28. Best Practices 2008-10-08 Security Heretic: We're Doing It Wrong 28
  • 29. Common Practices 2008-10-08 Security Heretic: We're Doing It Wrong 29
  • 30. Habitual Responses 2008-10-08 Security Heretic: We're Doing It Wrong 30
  • 31. Insanity: doing the same thing over and over again and expecting different results. - Albert Einstein 2008-10-08 Security Heretic: We're Doing It Wrong 31
  • 32. 2008-10-08 Security Heretic: We're Doing It Wrong 32
  • 33. 2008-10-08 Security Heretic: We're Doing It Wrong 33
  • 34. Proselytize Pros"e*ly*tize, v. t. [imp. & p. p. proselytized; p. pr. & vb. n. Proselytizing.] To convert to some religion, system, opinion, or the like; to bring, or cause to come, over; to proselyte. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 34
  • 35. 2008-10-08 Security Heretic: We're Doing It Wrong 35
  • 36. 2008-10-08 Security Heretic: We're Doing It Wrong 36
  • 37. 2008-10-08 Security Heretic: We're Doing It Wrong 37
  • 38. 2008-10-08 Security Heretic: We're Doing It Wrong 38
  • 39. 2008-10-08 Security Heretic: We're Doing It Wrong 39
  • 40. 2008-10-08 Security Heretic: We're Doing It Wrong 40
  • 41. 2008-10-08 Security Heretic: We're Doing It Wrong 41
  • 42. How many CPE hours will you gain for questioning your religion? 2008-10-08 Security Heretic: We're Doing It Wrong 42
  • 43. 2008-10-08 Security Heretic: We're Doing It Wrong 43
  • 44. 2008-10-08 Security Heretic: We're Doing It Wrong 44
  • 45. Actually, I’m claiming this presentation as CPE hours. You should too. 2008-10-08 Security Heretic: We're Doing It Wrong 45
  • 46. Sshhhhh… Maybe they won’t notice the topic. 2008-10-08 Security Heretic: We're Doing It Wrong 46
  • 47. The Vendors 2008-10-08 Security Heretic: We're Doing It Wrong 47
  • 48. Professional Services 2008-10-08 Security Heretic: We're Doing It Wrong 48
  • 49. Hardware and Software 2008-10-08 Security Heretic: We're Doing It Wrong 49
  • 50. Pundits and the Media 2008-10-08 Security Heretic: We're Doing It Wrong 50
  • 51. The Dogma 2008-10-08 Security Heretic: We're Doing It Wrong 51
  • 52. Dogma Dog"ma, n.; pl. E. Dogmas, L. Dogmata. [L. dogma, Gr. ?, pl. ?, fr. ? to think, seem, appear; akin to L. decet it is becoming. Cf. Decent.] 3. A doctrinal notion asserted without regard to evidence or truth; an arbitrary dictum. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 52
  • 53. The iPod Data Thief 2008-10-08 Security Heretic: We're Doing It Wrong 53
  • 54. The Complex Password 2008-10-08 Security Heretic: We're Doing It Wrong 54
  • 55. “Blood on the Walls” Metrics 2008-10-08 Security Heretic: We're Doing It Wrong 55
  • 56. The answer is “No” 2008-10-08 Security Heretic: We're Doing It Wrong 56
  • 57. No Personal Use 2008-10-08 Security Heretic: We're Doing It Wrong 57
  • 58. I’m only responsible for logical security 2008-10-08 Security Heretic: We're Doing It Wrong 58
  • 59. The Renaissance 2008-10-08 Security Heretic: We're Doing It Wrong 59
  • 60. Individual Contributions 2008-10-08 Security Heretic: We're Doing It Wrong 60
  • 61. Research and Development 2008-10-08 Security Heretic: We're Doing It Wrong 61
  • 62. Synthesis Syn"the*sis, n.; pl. Syntheses. [L., a mixture, properly, a putting together, Gr. ?, fr. ? to place or put together; sy`n with + ? to place. See Thesis.] 3. (Logic) The combination of separate elements of thought into a whole, as of simple into complex conceptions, species into genera, individual propositions into systems; -- the opposite of analysis. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 62
  • 63. Enlightenment 2008-10-08 Security Heretic: We're Doing It Wrong 63
  • 64. The Ninety-Five Theses 2008-10-08 Security Heretic: We're Doing It Wrong 64
  • 65. The Twelve Step Program 2008-10-08 Security Heretic: We're Doing It Wrong 65
  • 66. Reduced to 9 steps for irony. 2008-10-08 Security Heretic: We're Doing It Wrong 66
  • 67. 1. Admitting the problem. 2008-10-08 Security Heretic: We're Doing It Wrong 67
  • 68. 2. Admitting our complicity. 2008-10-08 Security Heretic: We're Doing It Wrong 68
  • 69. 3. Reasserting ethics. 2008-10-08 Security Heretic: We're Doing It Wrong 69
  • 70. 4. Regaining our self-respect. 2008-10-08 Security Heretic: We're Doing It Wrong 70
  • 71. 5. Finding a new path. 2008-10-08 Security Heretic: We're Doing It Wrong 71
  • 72. 6. Eating our own dog-food. 2008-10-08 Security Heretic: We're Doing It Wrong 72
  • 73. 7. Re-discovering passion. 2008-10-08 Security Heretic: We're Doing It Wrong 73
  • 74. 8. Communicating for success. 2008-10-08 Security Heretic: We're Doing It Wrong 74
  • 75. 9. Owning the suck. 2008-10-08 Security Heretic: We're Doing It Wrong 75
  • 76. NOT: Pwning teh 5uC|<0rz. 2008-10-08 Security Heretic: We're Doing It Wrong 76
  • 77. That’s a different talk altogether. 2008-10-08 Security Heretic: We're Doing It Wrong 77
  • 78. Q&A followup: myrcurial@100percentgeek.net 2008-10-08 Security Heretic: We're Doing It Wrong 78
  • 79. Credits, Links and Notices. Me: http://myrcurial.com and http://www.linkedin.com/in/jamesarlen and sometimes http://liquidmatrix.org/blog Thanks: My Family, Friends, and the SecTor Advisory Committee. Sources: notations and copies of materials are embedded within “notes” of the PPT file. Inspiration: coffee, omelets made by my lovely wife, Strattera, Club Mate, Information Society, NIN, altruism. Constructed with: Asus eeePC 701, Firefox, Powerpoint, angst. http://creativecommons.org/licenses/by-nc-sa/2.5/ca/ 2008-10-08 Security Heretic: We're Doing It Wrong 79