The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an...
Transcript of The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an...
![Page 1: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/1.jpg)
The Business of Internet Privacy & SecurityMichael Marques
March 14, 2018
![Page 2: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/2.jpg)
Cybersecurity is the practice of protecting systems, networks, programs, and data from
digital attacks.
![Page 3: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/3.jpg)
”Cybersecurity is one of the most serious economic and national security threats our
nation faces.”
– President Barack Obama
![Page 4: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/4.jpg)
“My message for companies that think they haven’t been attacked is: “You’re not looking
hard enough”.
– James Snook
![Page 5: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/5.jpg)
By the year 2020, we won’trecognize the cloud.
Proliferation of IoT devicesGlobal adoption of online Video Exponential growthin malicious activity
Radical evolution of edge services
![Page 6: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/6.jpg)
One forecast says Internet trafficwill have more than doubled.
Global IP Traffic
(Data Center to User)
2020
2.3ZB
2016
1ZB
![Page 7: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/7.jpg)
2020
600ZB
Data generated
by IoT Devices
But, by then, IoT devices alone will generate 275 times that much data.
2020
2.3ZB
Global IP Traffic
(Data Center to User)
![Page 8: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/8.jpg)
Meanwhile, malicious activityis more than keeping pace.
![Page 9: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/9.jpg)
DDoS attacks are growing faster than ever.
300400
500602 620
1,1001,200
0
200
400
600
800
1,000
1,200
1,400
SpamHausMarch 2013
SpamHausFebruary 2014
Apple Daily/PopVoteNovember 2014
BBCDecember 2015
KrebsOnSecuritySeptember 2016
OVHSeptember 2016
DynOctober 2016
Gb
ps4x
more DDoS attacks >200Gbps
in 2016 than 2015
2xmore DDoS attacks
<200Gbpsin 2016 than 2015
135kDDoS attacks/wkon average from
7/15 to 12/16
![Page 10: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/10.jpg)
Major companies regularly report large breaches.
2013 2014 2014 2014
3B user accounts 500M account records 145M user accounts 53M customer accounts
2016 2016 2016 2017
57M user & driver records >1K restaurants 68M user accounts 1.7M user accounts
2017 2017 2017 2017
143M consumer records 33M corporate contacts 14M subscriber accounts 120M household records
ESPORTSENTERTAINMENT
![Page 11: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/11.jpg)
StackPath is buildinga platform of secure servicesat the cloud’s edge.
![Page 12: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/12.jpg)
DATA ORIGINS DATA CONSUMERSSTORAGE
COMPUTE NETWORK
CONTROL
DNS WAF
VPN
Its core is an advanced, global infrastructuredesigned and automated for cloud scale.
![Page 13: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/13.jpg)
That infrastructure provides the foundation and building blocks with which we can deliver highly-secure edge services.
CONTENT
DELIVERY
PREDICTIVE
ANALYTICS
API
DELIVERY
VPNDDoS
MITIGATION
FILE
DELIVERY
DATA
ORIGINSDATA
CONSUMERS
![Page 14: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/14.jpg)
A multi-sided platform,ready for however the Internet grows and whatever we—or our customers—can innovate.
CONTENT
DELIVERY
PREDICTIVE
ANALYTICS
API
DELIVERY
VPNDDoS
MITIGATION
FILE
DELIVERY
DATA
ORIGINSDATA
CONSUMERS
![Page 15: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/15.jpg)
![Page 16: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/16.jpg)
OWASP’s Top 10
![Page 17: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/17.jpg)
Developers Should:
• Set goals and security requirements• Design your security from the start• Set frameworks & open sources• Continue to learn • Log and monitor
![Page 18: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/18.jpg)
Everyone Should:• Set up a VPN – Don’t trust unsecured or public Wi-Fi • Use email encryption• Set your account information to private• Change your password and don’t use for multiple accounts• Log out as soon as you’re done with a site• Provide only the minimum amount of information required
when creating an online account• Have a credit card only for online purchases • Monitor your accounts• Keep your anti-virus software current• Be smart – Don’t wire transfer money, send W2s, or help out
a Saudi prince
![Page 19: The Business of Internet Privacy & Security › ... › 11_StackPath_Michael.pdfwhen creating an online account • Have a credit card only for online purchases • Monitor your accounts](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0f394b7e708231d44319cd/html5/thumbnails/19.jpg)
RESOURCES
• StackPath: www.stackpath.com
• Homeland Security Stop. Think. Connect. Toolkit: https://www.dhs.gov/stopthinkconnect-toolkit
• National Cyber Security Alliance: https://staysafeonline.org/stay-safe-online/
• FDIC: https://www.fdic.gov/consumers/assistance/protection/idtheft.html
• Federal Trade Commission: https://www.ftc.gov/tips-advice/business-center/privacy-and-security/data-security
• Global Knowledge: https://www.globalknowledge.com/us-en/content/articles/10-ways-everyone-should-approach-cybersecurity/