- Inti Rossenbach, cybersecurity expert / manager since 1998
- Physics, applied cryptography then cybersecurity, sea kayak expedition in Patagonia, CISO
- University lecturer
- www.cryptosec.org
- iro@cryptosec.org
- Twitter @secucrypt
- Two real-life cyber attacks
- Threats, risks and security
- Ethics
- Vulnerabilities
- Perimetrical defenses
- In-depth defenses
- Humans
- Detection and reaction
https://www.theregister.com/2020/09/11/trump_twitter_account_recycled_password/
https://crackstation.net/
- No 0 risk, life is risky
- Risk treatment: accept, reduce / mitigate, refuse, transfer
- Impacts: confidentiality, integrity, availability
- Security controls: prevention, detection, reaction
Threat landscape:
- cybercrime (frauds, ransomware...)
- script kiddies
- competitors
- espionnage & state-sponsored actors
- ...
- Laws, regulations, privacy, GDPR...
- Always keep thinking by yourself about what you are doing
- Definition: bugs, configuration errors, conception mistakes, backdoors...
- Some samples: buffer overflows, injections, RCE, supply chain attacks ...
- Network
- Emails and attachments
- Web access
- Internal network segregation
- Vulnerability and patch management
- Hardening
- Antimalwares
- Cryptography
- Passwords and authentication
- Secure remote accesses
- Application security
- Social engineering: pshishing, spear phishing...
- Security policy
- Security organization
- Security awareness
- Logs and alerts
- Scans and pentests
- DFIR
- SOCs, CERTs, CSIRTs...