Suche senden
Hochladen
Marc Heuse. Responsiveness and Responsibility
•
0 gefällt mir
•
1,174 views
Positive Hack Days
Folgen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 22
Empfohlen
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Empfohlen
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
Weitere ähnliche Inhalte
Ähnlich wie Marc Heuse. Responsiveness and Responsibility
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Ähnlich wie Marc Heuse. Responsiveness and Responsibility
(20)
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
Secure Coding 2013
Secure Coding 2013
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Security by Weston Hecker
Security by Weston Hecker
Data management and office communication
Data management and office communication
Mehr von Positive Hack Days
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Positive Hack Days
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Positive Hack Days
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Positive Hack Days
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Positive Hack Days
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Positive Hack Days
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Positive Hack Days
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
Формальные методы защиты приложений
Формальные методы защиты приложений
Positive Hack Days
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
Теоретические основы Application Security
Теоретические основы Application Security
Positive Hack Days
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Positive Hack Days
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Positive Hack Days
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Positive Hack Days
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Positive Hack Days
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Positive Hack Days
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Positive Hack Days
Mehr von Positive Hack Days
(20)
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Формальные методы защиты приложений
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Kürzlich hochgeladen
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Kari Kakkonen
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Manik S Magar
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Kaya Weers
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
TopCSSGallery
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Kürzlich hochgeladen
(20)
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Marc Heuse. Responsiveness and Responsibility
1.
“Nobody knows” Marc “van
Hauser” Heuse The Hacker’s Choice / www.thc.org
2.
3.
4.
Security & Hacking are
changing
5.
BBS, Text Files, Groups, VMBs, local meetings
6.
Mailing Lists, e-Magazines, Groups, national meetings
7.
Web, Blogs, Books, Mailing
Lists, international Conferences, Training Courses, University Classes, …
8.
9.
Hardware Internet Pentesting Mainframes Binary DisassemblingExploitation Networking
& Routers Crypto Analysis, Crypto Implementation Large complex Apps (SAP, Oracle, SCADA, …) Standards, Policies & Procedures Telephony Forensics Social Engineering Malware / Anti-Malware Webapp Pentests Source Code Audits
10.
=> Anonymity => Specialisation =>
Lone Wolfs
11.
12.
13.
Great Hackers & Visionary Projects
14.
This makes you
successful 1. fun & passion 2. concentrate 3. naive rebel 4. teach yourself 5. talk, share & connect 6. don‘t be an asshole 7. выучить английский язык!
15.
Visionary Projects?
16.
Why?
17.
How?
18.
What?
19.
1. 2+ strong
founders 2. Passion – no ego 3. Communicate Vision 4. Easy to join & contribute This makes projects successful
20.
21.
1. My name
is … 2. I come from <city> 3. I know about: A, B, C, … 4. I want to learn about: A, …
22.
.