SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Downloaden Sie, um offline zu lesen
Did you know?
Hacks Happen

Jeremiah Grossman
Founder  CTO WhiteHat Security




                                  1
First Book I Read on Website Security




                  “It is insufficient to protect ourselves
                  with laws; we need to protect ourselves
                  with mathematics. It's just not true.

                  Cryptography can't do any of that.”   :(
                                                             2
Did you know?




                3
By the End of 2008...



        17 million
      programmers
       worldwide
Writing 6,000 lines of code per year (each)



                                              4
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008

Weitere ähnliche Inhalte

Andere mochten auch

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010Liz Allen
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skillssultanarun
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Associationguest43929b
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à RêvesCapgemini
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingPaul Brown
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究Satoshi Taniguchi
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechVidushi Infotech SSP Pvt Ltd
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowCastlewellan
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...Chelsea Dygert
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignSnow Jingxue Wang
 

Andere mochten auch (13)

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skills
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your House
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à Rêves
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
 
SERA Email 2.6.03
SERA Email 2.6.03SERA Email 2.6.03
SERA Email 2.6.03
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi Infotech
 
Managerial speeches
Managerial speechesManagerial speeches
Managerial speeches
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to Know
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 Campaign
 

Ähnlich wie Hack In The Box (Dubai) 04172008

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Jay Beale
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotesmat f.
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 

Ähnlich wie Hack In The Box (Dubai) 04172008 (20)

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Malwares
MalwaresMalwares
Malwares
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
CYBER
CYBERCYBER
CYBER
 
News Bytes
News BytesNews Bytes
News Bytes
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotes
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

Kürzlich hochgeladen

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Kürzlich hochgeladen (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Hack In The Box (Dubai) 04172008

  • 1. Did you know? Hacks Happen Jeremiah Grossman Founder CTO WhiteHat Security 1
  • 2. First Book I Read on Website Security “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. It's just not true. Cryptography can't do any of that.” :( 2
  • 4. By the End of 2008... 17 million programmers worldwide Writing 6,000 lines of code per year (each) 4