SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Crazy incentives
and how they drive
security into
no man's land
Christian Folini
Keynote 2023
Streaming
in China
Source:
@RealSexyCyborg
(Naomi Wu)
Streaming
in China
Hello Insomni’Hack!
I am Christian Folini
Find me at @ChrFolini / @folini@infosec.exchange
Swiss Security Engineer
OWASP CRS Co-Lead
Wearer of Many Helmets
“
In general, incentives are
anything that persuade a
person to alter their
behaviour. (Wikipedia)
“
In general, incentives are anything that
persuade a person to alter their behaviour.
...
Higher incentives amount to greater levels
of effort and therefore, higher levels of
performance.
Elon scrambling
for money
“
Nessus
Reports
More Nessus
Madness
Inflated
Numbers
Even Bigger
Numbers
Source: https://techjury.net/
The Infamous
Norse
Dashboard
A Kibana Example
Typical ModSecurity Dashboard Element
Survivorship
Bias
Source: Wikipedia: Survivorship Bias
Bug Bounty Hunters
Source:
https://pexels.com
Bug Bounty
Hunters
Penetration Testers
Large
Baskets
with
Many,
Many
Eggs
Crisis
Communication
Ransomware
Source: Wikipedia: AIDS DOS Trojan 1989
Ransomware and Cyber Insurance
Commercial WAF Detection Rates
Source: https://fraktal.fi (Tuomo Makkonnen, 2020)
Unce upon a time, there was a boy ...
The boy was a shepherd
His little herd also included a ram
He took them through a forest
In the forest, there was a wolf
The boy screamed and called the hunters
The hunters came and wanted to kill the wolf
But as it turned out, it was all a false positive!
The alternative: a false negative!
The alternative: a false negative!
The alternative: a false negative!
Commercial WAF Detection Rates
Source: https://fraktal.fi (Tuomo Makkonnen, 2020)
Summary
Let’s wrap this up!
Level 1
An overly relaxed attitude,
ignorance, negligence and
carelessness lead to bad
incentives for users.
Tricking them into weak
decisions undermining
security.
Two Levels of Bad Incentives
Level 2
Deliberately following or
setting crazy incentives for
immediate gain;
consciously prioritizing
financial benefit over
security of users and their
data.
It’s your job to raise the alarm when incentives
and security don’t align!
Contact
christian.folini@netnea.com
@ChrFolini
@folini@infosec.exchange

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Fiverr html5 test answers 2020
Fiverr html5 test answers 2020Fiverr html5 test answers 2020
Fiverr html5 test answers 2020
 
html complete notes
html complete noteshtml complete notes
html complete notes
 
Ilya Kosmodemiansky - An ultimate guide to upgrading your PostgreSQL installa...
Ilya Kosmodemiansky - An ultimate guide to upgrading your PostgreSQL installa...Ilya Kosmodemiansky - An ultimate guide to upgrading your PostgreSQL installa...
Ilya Kosmodemiansky - An ultimate guide to upgrading your PostgreSQL installa...
 
Food Safety- India
Food Safety- IndiaFood Safety- India
Food Safety- India
 
Solution Live-migrate vm in Openstack with Cpu Pinning configuratin
Solution Live-migrate vm in Openstack with Cpu Pinning configuratinSolution Live-migrate vm in Openstack with Cpu Pinning configuratin
Solution Live-migrate vm in Openstack with Cpu Pinning configuratin
 
HACCP implementation on cheddar cheese
HACCP implementation on cheddar cheeseHACCP implementation on cheddar cheese
HACCP implementation on cheddar cheese
 
RediSearch
RediSearchRediSearch
RediSearch
 
Genetically modified foods, Labelling
Genetically modified foods, LabellingGenetically modified foods, Labelling
Genetically modified foods, Labelling
 
1.1 Kawalan Bahan Kimia.ppt
1.1 Kawalan Bahan Kimia.ppt1.1 Kawalan Bahan Kimia.ppt
1.1 Kawalan Bahan Kimia.ppt
 
Web 2 | CSS - Cascading Style Sheets
Web 2 | CSS - Cascading Style SheetsWeb 2 | CSS - Cascading Style Sheets
Web 2 | CSS - Cascading Style Sheets
 
The design of haccp plan for potato chips plant in bangladesh
The design of haccp plan for potato chips plant in bangladeshThe design of haccp plan for potato chips plant in bangladesh
The design of haccp plan for potato chips plant in bangladesh
 
Good Manufacturing Practices
Good Manufacturing PracticesGood Manufacturing Practices
Good Manufacturing Practices
 
Current status of transgenic salmon 2016
Current status of transgenic salmon 2016Current status of transgenic salmon 2016
Current status of transgenic salmon 2016
 
GMP and GHP
GMP and GHPGMP and GHP
GMP and GHP
 
JavaScript and BOM events
JavaScript and BOM eventsJavaScript and BOM events
JavaScript and BOM events
 
50TPD wheat flour mill Quotation by cbecl
50TPD wheat flour mill Quotation by cbecl50TPD wheat flour mill Quotation by cbecl
50TPD wheat flour mill Quotation by cbecl
 
Html
HtmlHtml
Html
 
Impact of Genetically Modified Food on Human Health
Impact of Genetically Modified Food on Human HealthImpact of Genetically Modified Food on Human Health
Impact of Genetically Modified Food on Human Health
 
Quality control during processing and storage
Quality control during processing and storageQuality control during processing and storage
Quality control during processing and storage
 
Nqa 1 Is It Really Expensive
Nqa 1 Is It Really ExpensiveNqa 1 Is It Really Expensive
Nqa 1 Is It Really Expensive
 

Ähnlich wie Crazy incentives and how they drive security into no man's land

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 

Ähnlich wie Crazy incentives and how they drive security into no man's land (17)

Vannevar Bush Invention Essay In 1945
Vannevar Bush Invention Essay In 1945Vannevar Bush Invention Essay In 1945
Vannevar Bush Invention Essay In 1945
 
Luxury Personalised Stationery Personal Statio
Luxury Personalised Stationery Personal StatioLuxury Personalised Stationery Personal Statio
Luxury Personalised Stationery Personal Statio
 
Persuasive Essay For Birth Control
Persuasive Essay For Birth ControlPersuasive Essay For Birth Control
Persuasive Essay For Birth Control
 
Positive side-effects of misinformation
Positive side-effects of misinformationPositive side-effects of misinformation
Positive side-effects of misinformation
 
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Can You Start An Academic Essay With A Quote
Can You Start An Academic Essay With A QuoteCan You Start An Academic Essay With A Quote
Can You Start An Academic Essay With A Quote
 
ACT Writing Prep How To Write An Argumentative Essay The Pr
ACT Writing Prep How To Write An Argumentative Essay  The PrACT Writing Prep How To Write An Argumentative Essay  The Pr
ACT Writing Prep How To Write An Argumentative Essay The Pr
 
A NSA me segue (e a CIA também!)
A NSA me segue (e a CIA também!)A NSA me segue (e a CIA também!)
A NSA me segue (e a CIA também!)
 
Enlightenment Thinkers Essay. Online assignment writing service.
Enlightenment Thinkers Essay. Online assignment writing service.Enlightenment Thinkers Essay. Online assignment writing service.
Enlightenment Thinkers Essay. Online assignment writing service.
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
Thesis Statement Examples For Poetry Essays
Thesis Statement Examples For Poetry EssaysThesis Statement Examples For Poetry Essays
Thesis Statement Examples For Poetry Essays
 
Fiction process
Fiction processFiction process
Fiction process
 
Vassilis Galanos - The Luciferian Nature of Information and the Informational...
Vassilis Galanos - The Luciferian Nature of Information and the Informational...Vassilis Galanos - The Luciferian Nature of Information and the Informational...
Vassilis Galanos - The Luciferian Nature of Information and the Informational...
 
Business School Essays That Made A Difference Hands On Learning 4 All
Business School Essays That Made A Difference Hands On Learning 4 AllBusiness School Essays That Made A Difference Hands On Learning 4 All
Business School Essays That Made A Difference Hands On Learning 4 All
 
Counterterrorism Model Effectiveness
Counterterrorism Model EffectivenessCounterterrorism Model Effectiveness
Counterterrorism Model Effectiveness
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 

Mehr von Christian Folini

Mehr von Christian Folini (18)

OWASP ModSecurity - A few plot twists and what feels like a happy end
OWASP ModSecurity - A few plot twists and what feels like a happy endOWASP ModSecurity - A few plot twists and what feels like a happy end
OWASP ModSecurity - A few plot twists and what feels like a happy end
 
Never Walk Alone - Inspirations from a Growing OWASP Project
Never Walk Alone - Inspirations from a Growing OWASP ProjectNever Walk Alone - Inspirations from a Growing OWASP Project
Never Walk Alone - Inspirations from a Growing OWASP Project
 
What’s new in CRS4? An Update from the OWASP CRS project
What’s new in CRS4? An Update from the OWASP CRS projectWhat’s new in CRS4? An Update from the OWASP CRS project
What’s new in CRS4? An Update from the OWASP CRS project
 
The Adventurous Tale of Online Voting in Switzerland
The Adventurous Tale of Online Voting in SwitzerlandThe Adventurous Tale of Online Voting in Switzerland
The Adventurous Tale of Online Voting in Switzerland
 
EVoting in der Schweiz - Ein Fortsetzungsroman
EVoting in der Schweiz - Ein FortsetzungsromanEVoting in der Schweiz - Ein Fortsetzungsroman
EVoting in der Schweiz - Ein Fortsetzungsroman
 
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule SetSecuring Access to Internet Voting with the OWASP ModSecurity Core Rule Set
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set
 
Extensive Introduction to ModSecurity and the OWASP Core Rule Set
Extensive Introduction to ModSecurity and the OWASP Core Rule SetExtensive Introduction to ModSecurity and the OWASP Core Rule Set
Extensive Introduction to ModSecurity and the OWASP Core Rule Set
 
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
 
Introduction to ModSecurity and the OWASP Core Rule Set
Introduction to ModSecurity and the OWASP Core Rule SetIntroduction to ModSecurity and the OWASP Core Rule Set
Introduction to ModSecurity and the OWASP Core Rule Set
 
Folini Extended Introduction to ModSecurity and CRS3
Folini Extended Introduction to ModSecurity and CRS3Folini Extended Introduction to ModSecurity and CRS3
Folini Extended Introduction to ModSecurity and CRS3
 
Gedanken zur elektronischen Stimmabgabe für Datenschützer
Gedanken zur elektronischen Stimmabgabe für DatenschützerGedanken zur elektronischen Stimmabgabe für Datenschützer
Gedanken zur elektronischen Stimmabgabe für Datenschützer
 
Medieval Castles and Modern Servers
Medieval Castles and Modern ServersMedieval Castles and Modern Servers
Medieval Castles and Modern Servers
 
E-Voting, die Sicherheit und die Rolle der Experten
E-Voting, die Sicherheit und die Rolle der ExpertenE-Voting, die Sicherheit und die Rolle der Experten
E-Voting, die Sicherheit und die Rolle der Experten
 
Black alps 2018-folini-d-dos
Black alps 2018-folini-d-dosBlack alps 2018-folini-d-dos
Black alps 2018-folini-d-dos
 
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX PlusOptimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX Plus
 
A General Look at the State of Security - AFCEA 2017
A General Look at the State of Security - AFCEA 2017A General Look at the State of Security - AFCEA 2017
A General Look at the State of Security - AFCEA 2017
 
Introducing the OWASP ModSecurity Core Rule Set
Introducing the OWASP ModSecurity Core Rule SetIntroducing the OWASP ModSecurity Core Rule Set
Introducing the OWASP ModSecurity Core Rule Set
 
OWASP ModSecurity Core Rules Paranoia Mode
OWASP ModSecurity Core Rules Paranoia ModeOWASP ModSecurity Core Rules Paranoia Mode
OWASP ModSecurity Core Rules Paranoia Mode
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Crazy incentives and how they drive security into no man's land