SlideShare a Scribd company logo
1 of 79
Security Heretic:
We’re Doing It Wrong
    James Arlen aka Myrcurial
          SecTor 2008
        October 8, 2008
Hi.




2008-10-08   Security Heretic: We're Doing It Wrong   2
Great title huh?




2008-10-08     Security Heretic: We're Doing It Wrong   3
Disclaimer:

I am actively employed in the Infosec
   industry, but not authorized to speak on
   behalf of my employer.




2008-10-08      Security Heretic: We're Doing It Wrong   4
Disclaimer:

I am actively* employed in the Infosec
   industry, but not authorized to speak on
   behalf of my employer.




                                                         * (I hope…)
2008-10-08      Security Heretic: We're Doing It Wrong             5
Disclaimer (2):

I am going to say some startling things.
   There are no sacred entities when the
   heretic starts ranting.




2008-10-08        Security Heretic: We're Doing It Wrong   6
Disclaimer (3):

If you are easily offended, you might want
   to get yourself a cool compress or some
   sort of smelling salts, it’s going to be a
   stressful hour.




2008-10-08        Security Heretic: We're Doing It Wrong   7
Heretic

Her"e*tic, n. [L. haereticus, Gr. ? able to choose, heretical, fr. ? to
     take, choose: cf. F. h['e]r['e]tique. See Heresy.]


1. One who holds to a heresy; one who
   believes some doctrine contrary to the
   established faith or prevailing religion.

                                    Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.



2008-10-08                  Security Heretic: We're Doing It Wrong                                  8
I’m tired of looking silly.




2008-10-08          Security Heretic: We're Doing It Wrong   9
2008-10-08   Security Heretic: We're Doing It Wrong   10
Really tired.



2008-10-08   Security Heretic: We're Doing It Wrong   11
Security “Industry” =




2008-10-08         Security Heretic: We're Doing It Wrong   12
We can change that.




2008-10-08     Security Heretic: We're Doing It Wrong   13
We can change that. We can fix that.




2008-10-08     Security Heretic: We're Doing It Wrong   14
We can change that. We can fix that.



             But it’s going to really irritate people.



2008-10-08               Security Heretic: We're Doing It Wrong   15
We can change that. We can fix that.



             But it’s going to really irritate people.

                                                                  In a good way.
2008-10-08               Security Heretic: We're Doing It Wrong                16
The Past




2008-10-08              Security Heretic: We're Doing It Wrong   17
"Those that fail to learn
  from history, are
  doomed to repeat it."

             - Winston Churchill




2008-10-08                Security Heretic: We're Doing It Wrong   18
Information Security

» Confidentiality
» Integrity
» Availability




2008-10-08      Security Heretic: We're Doing It Wrong   19
Julius Caesar: Mr.
           Confidentiality




2008-10-08               Security Heretic: We're Doing It Wrong   20
Sumer: Integrity




2008-10-08                 Security Heretic: We're Doing It Wrong   21
Jewish Scribes:
               Availability




2008-10-08                 Security Heretic: We're Doing It Wrong   22
»     Guilds
»     Seals
»     Obfuscation
»     Physical security




2008-10-08           Security Heretic: We're Doing It Wrong   23
Computer Security




2008-10-08     Security Heretic: We're Doing It Wrong   24
»     Theories
»     1970s
»     Multics
»     US Military
»     Cambridge University
»     Research Microkernels



2008-10-08         Security Heretic: We're Doing It Wrong   25
The Religion




2008-10-08                  Security Heretic: We're Doing It Wrong   26
Religion

Re*li"gion (r[-e]*l[i^]j"[u^]n), n. [F., from L. religio; cf. religens pious,
   revering the gods, Gr. 'ale`gein to heed, have a care. Cf. Neglect.]


4. Strictness of fidelity in conforming to
  any practice, as if it were an enjoined
  rule of conduct. [R.]

                                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.

2008-10-08                      Security Heretic: We're Doing It Wrong                                 27
Best Practices




2008-10-08    Security Heretic: We're Doing It Wrong   28
Common Practices




2008-10-08      Security Heretic: We're Doing It Wrong   29
Habitual Responses




2008-10-08      Security Heretic: We're Doing It Wrong   30
Insanity: doing the
  same thing over and
  over again and
  expecting different
  results.

             - Albert Einstein



2008-10-08              Security Heretic: We're Doing It Wrong   31
2008-10-08   Security Heretic: We're Doing It Wrong   32
2008-10-08   Security Heretic: We're Doing It Wrong   33
Proselytize

Pros"e*ly*tize, v. t. [imp. & p. p. proselytized; p. pr. & vb. n.
   Proselytizing.]


To convert to some religion, system,
 opinion, or the like; to bring, or cause to
 come, over; to proselyte.

                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.


2008-10-08                  Security Heretic: We're Doing It Wrong                     34
2008-10-08   Security Heretic: We're Doing It Wrong   35
2008-10-08   Security Heretic: We're Doing It Wrong   36
2008-10-08   Security Heretic: We're Doing It Wrong   37
2008-10-08   Security Heretic: We're Doing It Wrong   38
2008-10-08   Security Heretic: We're Doing It Wrong   39
2008-10-08   Security Heretic: We're Doing It Wrong   40
2008-10-08   Security Heretic: We're Doing It Wrong   41
How many CPE hours will you gain for
                  questioning your religion?




2008-10-08               Security Heretic: We're Doing It Wrong   42
2008-10-08   Security Heretic: We're Doing It Wrong   43
2008-10-08   Security Heretic: We're Doing It Wrong   44
Actually, I’m claiming this presentation as
                   CPE hours.

               You should too.



2008-10-08       Security Heretic: We're Doing It Wrong   45
Sshhhhh…

             Maybe they won’t notice the topic.




2008-10-08              Security Heretic: We're Doing It Wrong   46
The Vendors




2008-10-08   Security Heretic: We're Doing It Wrong   47
Professional Services




2008-10-08           Security Heretic: We're Doing It Wrong   48
Hardware and Software




2008-10-08      Security Heretic: We're Doing It Wrong   49
Pundits and the Media




2008-10-08         Security Heretic: We're Doing It Wrong   50
The Dogma




2008-10-08               Security Heretic: We're Doing It Wrong   51
Dogma

Dog"ma, n.; pl. E. Dogmas, L. Dogmata. [L. dogma, Gr. ?, pl. ?, fr. ?
  to think, seem, appear; akin to L. decet it is becoming. Cf.
  Decent.]


3. A doctrinal notion asserted without
  regard to evidence or truth; an arbitrary
  dictum.
                                   Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.


2008-10-08                 Security Heretic: We're Doing It Wrong                                 52
The iPod Data Thief




2008-10-08        Security Heretic: We're Doing It Wrong   53
The Complex Password




2008-10-08      Security Heretic: We're Doing It Wrong   54
“Blood on the Walls”
  Metrics




2008-10-08        Security Heretic: We're Doing It Wrong   55
The answer is “No”




2008-10-08       Security Heretic: We're Doing It Wrong   56
No Personal Use




2008-10-08        Security Heretic: We're Doing It Wrong   57
I’m only responsible for
  logical security




2008-10-08         Security Heretic: We're Doing It Wrong   58
The Renaissance




2008-10-08          Security Heretic: We're Doing It Wrong   59
Individual Contributions




2008-10-08         Security Heretic: We're Doing It Wrong   60
Research and Development




2008-10-08          Security Heretic: We're Doing It Wrong   61
Synthesis

Syn"the*sis, n.; pl. Syntheses. [L., a mixture, properly, a putting
   together, Gr. ?, fr. ? to place or put together; sy`n with + ? to
   place. See Thesis.]


3. (Logic) The combination of separate elements
  of thought into a whole, as of simple into
  complex conceptions, species into genera,
  individual propositions into systems; -- the
  opposite of analysis.

                        Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc.

2008-10-08                  Security Heretic: We're Doing It Wrong                     62
Enlightenment




2008-10-08    Security Heretic: We're Doing It Wrong   63
The Ninety-Five Theses




2008-10-08        Security Heretic: We're Doing It Wrong   64
The Twelve Step
                  Program




2008-10-08                Security Heretic: We're Doing It Wrong   65
Reduced to 9 steps for irony.




2008-10-08            Security Heretic: We're Doing It Wrong   66
1. Admitting the problem.




2008-10-08          Security Heretic: We're Doing It Wrong   67
2. Admitting our complicity.




2008-10-08           Security Heretic: We're Doing It Wrong   68
3. Reasserting ethics.




2008-10-08        Security Heretic: We're Doing It Wrong   69
4. Regaining our self-respect.




2008-10-08            Security Heretic: We're Doing It Wrong   70
5. Finding a new path.




2008-10-08        Security Heretic: We're Doing It Wrong   71
6. Eating our own dog-food.




2008-10-08           Security Heretic: We're Doing It Wrong   72
7. Re-discovering passion.




2008-10-08          Security Heretic: We're Doing It Wrong   73
8. Communicating for success.




2008-10-08            Security Heretic: We're Doing It Wrong   74
9. Owning the suck.




2008-10-08       Security Heretic: We're Doing It Wrong   75
NOT: Pwning          teh 5uC|<0rz.




2008-10-08        Security Heretic: We're Doing It Wrong   76
That’s a different talk altogether.




2008-10-08              Security Heretic: We're Doing It Wrong   77
Q&A



             followup: myrcurial@100percentgeek.net


2008-10-08               Security Heretic: We're Doing It Wrong   78
Credits, Links and Notices.
Me:           http://myrcurial.com and
              http://www.linkedin.com/in/jamesarlen and sometimes
              http://liquidmatrix.org/blog

Thanks: My Family, Friends, and the SecTor Advisory Committee.

Sources: notations and copies of materials are embedded within
   “notes” of the PPT file.

Inspiration: coffee, omelets made by my lovely wife, Strattera, Club
   Mate, Information Society, NIN, altruism.

Constructed with: Asus eeePC 701, Firefox, Powerpoint, angst.


http://creativecommons.org/licenses/by-nc-sa/2.5/ca/
2008-10-08                                       Security Heretic: We're Doing It Wrong   79

More Related Content

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SecTor 2008 - Security Heretic: We're Doing It Wrong

  • 1. Security Heretic: We’re Doing It Wrong James Arlen aka Myrcurial SecTor 2008 October 8, 2008
  • 2. Hi. 2008-10-08 Security Heretic: We're Doing It Wrong 2
  • 3. Great title huh? 2008-10-08 Security Heretic: We're Doing It Wrong 3
  • 4. Disclaimer: I am actively employed in the Infosec industry, but not authorized to speak on behalf of my employer. 2008-10-08 Security Heretic: We're Doing It Wrong 4
  • 5. Disclaimer: I am actively* employed in the Infosec industry, but not authorized to speak on behalf of my employer. * (I hope…) 2008-10-08 Security Heretic: We're Doing It Wrong 5
  • 6. Disclaimer (2): I am going to say some startling things. There are no sacred entities when the heretic starts ranting. 2008-10-08 Security Heretic: We're Doing It Wrong 6
  • 7. Disclaimer (3): If you are easily offended, you might want to get yourself a cool compress or some sort of smelling salts, it’s going to be a stressful hour. 2008-10-08 Security Heretic: We're Doing It Wrong 7
  • 8. Heretic Her"e*tic, n. [L. haereticus, Gr. ? able to choose, heretical, fr. ? to take, choose: cf. F. h['e]r['e]tique. See Heresy.] 1. One who holds to a heresy; one who believes some doctrine contrary to the established faith or prevailing religion. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 8
  • 9. I’m tired of looking silly. 2008-10-08 Security Heretic: We're Doing It Wrong 9
  • 10. 2008-10-08 Security Heretic: We're Doing It Wrong 10
  • 11. Really tired. 2008-10-08 Security Heretic: We're Doing It Wrong 11
  • 12. Security “Industry” = 2008-10-08 Security Heretic: We're Doing It Wrong 12
  • 13. We can change that. 2008-10-08 Security Heretic: We're Doing It Wrong 13
  • 14. We can change that. We can fix that. 2008-10-08 Security Heretic: We're Doing It Wrong 14
  • 15. We can change that. We can fix that. But it’s going to really irritate people. 2008-10-08 Security Heretic: We're Doing It Wrong 15
  • 16. We can change that. We can fix that. But it’s going to really irritate people. In a good way. 2008-10-08 Security Heretic: We're Doing It Wrong 16
  • 17. The Past 2008-10-08 Security Heretic: We're Doing It Wrong 17
  • 18. "Those that fail to learn from history, are doomed to repeat it." - Winston Churchill 2008-10-08 Security Heretic: We're Doing It Wrong 18
  • 19. Information Security » Confidentiality » Integrity » Availability 2008-10-08 Security Heretic: We're Doing It Wrong 19
  • 20. Julius Caesar: Mr. Confidentiality 2008-10-08 Security Heretic: We're Doing It Wrong 20
  • 21. Sumer: Integrity 2008-10-08 Security Heretic: We're Doing It Wrong 21
  • 22. Jewish Scribes: Availability 2008-10-08 Security Heretic: We're Doing It Wrong 22
  • 23. » Guilds » Seals » Obfuscation » Physical security 2008-10-08 Security Heretic: We're Doing It Wrong 23
  • 24. Computer Security 2008-10-08 Security Heretic: We're Doing It Wrong 24
  • 25. » Theories » 1970s » Multics » US Military » Cambridge University » Research Microkernels 2008-10-08 Security Heretic: We're Doing It Wrong 25
  • 26. The Religion 2008-10-08 Security Heretic: We're Doing It Wrong 26
  • 27. Religion Re*li"gion (r[-e]*l[i^]j"[u^]n), n. [F., from L. religio; cf. religens pious, revering the gods, Gr. 'ale`gein to heed, have a care. Cf. Neglect.] 4. Strictness of fidelity in conforming to any practice, as if it were an enjoined rule of conduct. [R.] Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 27
  • 28. Best Practices 2008-10-08 Security Heretic: We're Doing It Wrong 28
  • 29. Common Practices 2008-10-08 Security Heretic: We're Doing It Wrong 29
  • 30. Habitual Responses 2008-10-08 Security Heretic: We're Doing It Wrong 30
  • 31. Insanity: doing the same thing over and over again and expecting different results. - Albert Einstein 2008-10-08 Security Heretic: We're Doing It Wrong 31
  • 32. 2008-10-08 Security Heretic: We're Doing It Wrong 32
  • 33. 2008-10-08 Security Heretic: We're Doing It Wrong 33
  • 34. Proselytize Pros"e*ly*tize, v. t. [imp. & p. p. proselytized; p. pr. & vb. n. Proselytizing.] To convert to some religion, system, opinion, or the like; to bring, or cause to come, over; to proselyte. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 34
  • 35. 2008-10-08 Security Heretic: We're Doing It Wrong 35
  • 36. 2008-10-08 Security Heretic: We're Doing It Wrong 36
  • 37. 2008-10-08 Security Heretic: We're Doing It Wrong 37
  • 38. 2008-10-08 Security Heretic: We're Doing It Wrong 38
  • 39. 2008-10-08 Security Heretic: We're Doing It Wrong 39
  • 40. 2008-10-08 Security Heretic: We're Doing It Wrong 40
  • 41. 2008-10-08 Security Heretic: We're Doing It Wrong 41
  • 42. How many CPE hours will you gain for questioning your religion? 2008-10-08 Security Heretic: We're Doing It Wrong 42
  • 43. 2008-10-08 Security Heretic: We're Doing It Wrong 43
  • 44. 2008-10-08 Security Heretic: We're Doing It Wrong 44
  • 45. Actually, I’m claiming this presentation as CPE hours. You should too. 2008-10-08 Security Heretic: We're Doing It Wrong 45
  • 46. Sshhhhh… Maybe they won’t notice the topic. 2008-10-08 Security Heretic: We're Doing It Wrong 46
  • 47. The Vendors 2008-10-08 Security Heretic: We're Doing It Wrong 47
  • 48. Professional Services 2008-10-08 Security Heretic: We're Doing It Wrong 48
  • 49. Hardware and Software 2008-10-08 Security Heretic: We're Doing It Wrong 49
  • 50. Pundits and the Media 2008-10-08 Security Heretic: We're Doing It Wrong 50
  • 51. The Dogma 2008-10-08 Security Heretic: We're Doing It Wrong 51
  • 52. Dogma Dog"ma, n.; pl. E. Dogmas, L. Dogmata. [L. dogma, Gr. ?, pl. ?, fr. ? to think, seem, appear; akin to L. decet it is becoming. Cf. Decent.] 3. A doctrinal notion asserted without regard to evidence or truth; an arbitrary dictum. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 52
  • 53. The iPod Data Thief 2008-10-08 Security Heretic: We're Doing It Wrong 53
  • 54. The Complex Password 2008-10-08 Security Heretic: We're Doing It Wrong 54
  • 55. “Blood on the Walls” Metrics 2008-10-08 Security Heretic: We're Doing It Wrong 55
  • 56. The answer is “No” 2008-10-08 Security Heretic: We're Doing It Wrong 56
  • 57. No Personal Use 2008-10-08 Security Heretic: We're Doing It Wrong 57
  • 58. I’m only responsible for logical security 2008-10-08 Security Heretic: We're Doing It Wrong 58
  • 59. The Renaissance 2008-10-08 Security Heretic: We're Doing It Wrong 59
  • 60. Individual Contributions 2008-10-08 Security Heretic: We're Doing It Wrong 60
  • 61. Research and Development 2008-10-08 Security Heretic: We're Doing It Wrong 61
  • 62. Synthesis Syn"the*sis, n.; pl. Syntheses. [L., a mixture, properly, a putting together, Gr. ?, fr. ? to place or put together; sy`n with + ? to place. See Thesis.] 3. (Logic) The combination of separate elements of thought into a whole, as of simple into complex conceptions, species into genera, individual propositions into systems; -- the opposite of analysis. Webster's Revised Unabridged Dictionary, © 1996, 1998 MICRA, Inc. 2008-10-08 Security Heretic: We're Doing It Wrong 62
  • 63. Enlightenment 2008-10-08 Security Heretic: We're Doing It Wrong 63
  • 64. The Ninety-Five Theses 2008-10-08 Security Heretic: We're Doing It Wrong 64
  • 65. The Twelve Step Program 2008-10-08 Security Heretic: We're Doing It Wrong 65
  • 66. Reduced to 9 steps for irony. 2008-10-08 Security Heretic: We're Doing It Wrong 66
  • 67. 1. Admitting the problem. 2008-10-08 Security Heretic: We're Doing It Wrong 67
  • 68. 2. Admitting our complicity. 2008-10-08 Security Heretic: We're Doing It Wrong 68
  • 69. 3. Reasserting ethics. 2008-10-08 Security Heretic: We're Doing It Wrong 69
  • 70. 4. Regaining our self-respect. 2008-10-08 Security Heretic: We're Doing It Wrong 70
  • 71. 5. Finding a new path. 2008-10-08 Security Heretic: We're Doing It Wrong 71
  • 72. 6. Eating our own dog-food. 2008-10-08 Security Heretic: We're Doing It Wrong 72
  • 73. 7. Re-discovering passion. 2008-10-08 Security Heretic: We're Doing It Wrong 73
  • 74. 8. Communicating for success. 2008-10-08 Security Heretic: We're Doing It Wrong 74
  • 75. 9. Owning the suck. 2008-10-08 Security Heretic: We're Doing It Wrong 75
  • 76. NOT: Pwning teh 5uC|<0rz. 2008-10-08 Security Heretic: We're Doing It Wrong 76
  • 77. That’s a different talk altogether. 2008-10-08 Security Heretic: We're Doing It Wrong 77
  • 78. Q&A followup: myrcurial@100percentgeek.net 2008-10-08 Security Heretic: We're Doing It Wrong 78
  • 79. Credits, Links and Notices. Me: http://myrcurial.com and http://www.linkedin.com/in/jamesarlen and sometimes http://liquidmatrix.org/blog Thanks: My Family, Friends, and the SecTor Advisory Committee. Sources: notations and copies of materials are embedded within “notes” of the PPT file. Inspiration: coffee, omelets made by my lovely wife, Strattera, Club Mate, Information Society, NIN, altruism. Constructed with: Asus eeePC 701, Firefox, Powerpoint, angst. http://creativecommons.org/licenses/by-nc-sa/2.5/ca/ 2008-10-08 Security Heretic: We're Doing It Wrong 79