Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence...

68

Transcript of Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence...

Page 1: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 2: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

This presentation leaves copyright of the

content to the presenter. Unless otherwise

noted in the materials, uploaded content

carries the Creative Commons Attribution

4.0 International (CC BY 4.0), which grants

usage to the general public, with appropriate

credit to the author.

Page 3: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

QUIZ

lockdown.tarahugh.es

Page 4: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Authentication, non-repudiation of origin, message integrity, message privacy and optional method of identifying the signer’s certificates are all attributes of what security standards?A. Block-CipherB. S/MimeC. HTTPSD. WPA3

Page 5: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Loading...

Page 6: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 7: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Which data type is most vulnerable to steganographic data exfiltration?

A. IPLD Block Chain HeadersB. Jpeg Image FormatC. MP4 Video Streaming FormatD. MQTT IoT data formatE. None are Vulnerable

Page 8: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Loading...

Page 9: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 10: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Which policy would take precedence when dealing with a zero-day security breach: Coordinated Vulnerability Disclosure (CVD) or GDPR's 72 hour disclosure policy?A. CVD with best effort for GDPR B. GDPR with best effort for CVD C. CVD in all situationsD. GDPR in all situations

Page 11: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Loading...

Page 12: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 13: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

This poll was fake,

designed to make you feel

insecure about your

knowledge

Page 14: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 15: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 16: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 17: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 18: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 19: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 20: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

THE NEIL STORY

Page 21: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 22: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 23: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 24: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 25: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 26: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 27: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 28: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

<- INSERT IT CONFERENCE

HERE! ->

Page 29: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 30: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 31: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 32: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 33: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 34: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 35: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 36: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 37: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 38: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 39: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 40: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 41: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 42: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 43: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 44: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 45: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 46: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 47: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 48: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 49: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 50: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 51: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 52: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 53: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 54: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

Not a

Doctor

Page 55: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 56: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 57: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 58: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 59: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 60: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 61: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 62: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 63: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 64: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 65: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 66: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 67: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)
Page 68: Creative Commons Attribution 4.0 International (CC BY 4.0) · Which policy would take precedence when dealing a a zero-day security breach, Coordinated Vulnerability Disclosure (CVD)

@tinytara:

tara-hughes:

: [email protected]