marcel, German
@marcel@waldvogel.family avatar

begrüsst seine Besucher des mit einem kleinen .

marcel,
@marcel@waldvogel.family avatar

@Folini was greeting everyone half an hour ago to . I'm looking forward to a great day.

marcel,
@marcel@waldvogel.family avatar

@evacide from had a great Keynote about the human aspects, why we need 100% coverage (with just 99%, drive-by zero-click malware insertions can still happen).

marcel,
@marcel@waldvogel.family avatar

The IMHO most important take-away message from @evacide 's Keynote, not only with respect to #DomesticAbuse :

«Humans are more important than Things»

(aka: Don't treat #Humans as #Things! Don't even start thinking about it!)

marcel,
@marcel@waldvogel.family avatar

The second keynote at #SCS23 with some technical difficulties. Therefore, the screen is filmed with a camera and projected to the screen. Instead of a plain HDMI connection. (And no, it is not for security reasons aka #AirGap).

marcel,
@marcel@waldvogel.family avatar

in the second keynote points out that most passwords follow the following rule:

Password23!

Where "Password" is the capitalization of an important word, "23" is the (2 or 4 digit) year, and "!" is the most common special character.

marcel,
@marcel@waldvogel.family avatar
marcel,
@marcel@waldvogel.family avatar

@ChristinaLekati talking about new trends in at :

➡️ In some cases, one year of "lying low", ⅔ years of slow contact buildup
➡️ Buildup of "personal relationship", possibly including
➡️ Learning whether to recruit as insider (disgruntled? …)
➡️ Opinion surveys to get more information

is upgrading to real spy recruiting qualities.
Be aware of this!

marcel,
@marcel@waldvogel.family avatar

@ChristinaLekati mentions that spy agencies are talking about campaigns, with a particular focus on .

Attackers ranging from state-sponsored, Cyber Criminals, Competitors, but also Hacktivists.

Her advice: "Be careful, especially if your organization is involved in , important technology , , , or targeted by ."

marcel,
@marcel@waldvogel.family avatar

@ChristinaLekati advice (my summary):

  • Know about the attack
  • Learn how to detect it
  • Learn what to do, when you think someone starts getting you involved (whether/when/how to abort)

Tell your friends and family!

marcel,
@marcel@waldvogel.family avatar

talking about "Secure-by-Design: How do You Design with a Security Mindset for the User?" at :

  • Design for ease of use
  • Design with misuse in mind
  • How we failed to prevent online access/commerce, word processors, email, supply chains, IoT devices, … being misused

Design approaches:

marcel,
@marcel@waldvogel.family avatar

Critique about programs:

Q&A:

  • might be helpful to protect against , which targets the user's workflow (last-minute things)
marcel,
@marcel@waldvogel.family avatar

working on specific , avoiding repetitions.

  • Move from compliance-focused to really promote awareness/behavior change, long-term sustainment/culture change, and metrics framework
  • 150 professions, 50 locations, 4 languages
  • "Legacy" means up to 100 years old equipment 😊

marcel,
@marcel@waldvogel.family avatar

specific awareness:

  • 1500 interviews with team leass to learn about problems, challenges, situation
  • Dashboard with actionable data, interpreted
  • Collection of learning nuggets (with timeouts)
  • For the unmeasured parts, have risk management
  • Security Champions all over the company
  • Continuous improvement

marcel,
@marcel@waldvogel.family avatar

are often too obvious about being a :
looks at error messages and their differences between the emulated service and the honeypot's version. She requires only a single message to expose the fake service.

Honeypot writer need to improve their "compatibility".

marcel,
@marcel@waldvogel.family avatar

on the challenges of next year in the interview with @Folini :

Managing risk, namely the potential security problems comes from using services, will be the main challenge for the near future. And don't forget the subcontracters.

Christian Folini compared this to the leak, without mentioning their name.

marcel,
@marcel@waldvogel.family avatar

from talking about the challenges of managing a network: "Help! I Have Data Center Nightmare"

marcel,
@marcel@waldvogel.family avatar

at explaining that when adding more manageability, scalability, virtualization etc. you continually add abstraction layers, separate networks, ….
Only to reconnect them at the next level again, reintroducing the interdependence and kill isolation anf security.

"So, this is not , this is !"

marcel,
@marcel@waldvogel.family avatar

Only opened the goodie bag today (thanks, @adfichter for the reminder! 😊).

I really appreciate the guys that included the bugs I can hunt for strength (left) and the blue pills, not only for the blue team! 🖖

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • megavids
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • provamag3
  • JUstTest
  • All magazines