SlideShare a Scribd company logo
1 of 80
Download to read offline
Code Blue in the ICU!
Thinking	
  about	
  network	
  safety	
  in	
  a	
  public	
  health	
  light	
  
©	
  Jeff	
  Moss	
  –	
  jm@defcon.org	
  
h@p://chrisharrison.net/	
  
1. NaEon	
  States	
  want	
  SECRETS	
  
1. NaEon	
  States	
  want	
  SECRETS	
  
2. Organized	
  Criminals	
  want	
  MONEY	
  
1. NaEon	
  States	
  want	
  SECRETS	
  
2. Organized	
  Criminals	
  want	
  MONEY	
  
3. Protesters	
  want	
  ATTENTION	
  
1. NaEon	
  States	
  want	
  SECRETS	
  
2. Organized	
  Criminals	
  want	
  MONEY	
  
3. Protesters	
  want	
  ATTENTION	
  
4. Hackers	
  &	
  researchers	
  want	
  
KNOWLEDGE	
  
1. NaEon	
  States	
  want	
  SECRETS	
  
2. Organized	
  Criminals	
  want	
  MONEY	
  
3. Protesters	
  want	
  ATTENTION	
  
4. Hackers	
  &	
  researchers	
  want	
  
KNOWLEDGE	
  
That’s	
  you	
  guys!	
  
Hackers	
  &	
  Researchers	
  point	
  the	
  way!	
  
-­‐ Discover	
  new	
  classes	
  of	
  vulnerabiliEes	
  
-­‐ Expose	
  poor	
  product	
  security	
  
-­‐ Spur	
  public	
  debate	
  
Hackers	
  &	
  Researchers	
  point	
  the	
  way!	
  
-­‐ Discover	
  new	
  classes	
  of	
  vulnerabiliEes	
  
-­‐ Expose	
  poor	
  product	
  security	
  
-­‐ Spur	
  public	
  debate	
  
Criminals	
  and	
  Governments	
  don’t	
  do	
  this	
  
It’s	
  not	
  in	
  their	
  interests	
  
All	
  these	
  groups	
  need	
  the	
  net	
  to	
  work	
  
Q:	
  What	
  if	
  there	
  is	
  a	
  5th	
  group	
  that	
  doesn’t?	
  
Denial of service is increasing
0	
  
00	
  
00	
  
00	
  
00	
  
00	
  
00	
  
00	
  
2010	
   2011	
   Mar-­‐12	
   Oct-­‐12	
   Apr-­‐13	
   Feb-­‐14	
   Sept-­‐14	
  ?	
  
DDoS	
  in	
  Gigabits	
  per	
  second	
  
Gps	
  fl
?	
  
NTP	
  RAMP	
  
CloudFlare	
  
DNS	
  RAMP	
  
SpamHaus	
  
When	
  invesEng:	
  
Specialize	
  for	
  larger	
  risk	
  /	
  returns	
  
When	
  invesEng:	
  
Specialize	
  for	
  larger	
  risk	
  /	
  returns	
  
Diversify	
  to	
  reduce	
  risk	
  /	
  returns	
  
We	
  now	
  have	
  clouds	
  of	
  complexity	
  
We	
  have	
  virtual	
  clouds	
  of	
  complexity	
  
The	
  failure	
  modes	
  of	
  Complex	
  systems	
  
are	
  impossible	
  to	
  predict	
  
I	
  like	
  the	
  Code	
  Blue	
  press	
  release	
  
“Code	
  Blue	
  is	
  a	
  hospital	
  emergency	
  code	
  that	
  indicates	
  a	
  paEent	
  in	
  
need	
  of	
  immediate	
  medical	
  a@enEon,	
  or	
  that	
  calls	
  for	
  relevant	
  teams	
  to	
  
respond	
  immediately.	
  We	
  named	
  the	
  conference	
  ajer	
  the	
  code	
  
because	
  we	
  hope	
  to	
  save	
  the	
  world	
  by	
  combining	
  people’s	
  knowledge”	
  
h@p://japandailypress.com/white-­‐hat-­‐hackers-­‐to-­‐gather-­‐at-­‐code-­‐blue-­‐cybersecurity-­‐conference-­‐in-­‐tokyo-­‐1043926/	
  
Public	
  health	
  analogy	
  
•  No	
  one	
  thinks	
  they	
  are	
  going	
  to	
  cure	
  cancer	
  
•  Diseases	
  are	
  “managed”,	
  very	
  few	
  are	
  ever	
  eliminated	
  
•  It	
  is	
  possible	
  to	
  be	
  re-­‐infected	
  
Public	
  health	
  analogy	
  
•  No	
  one	
  thinks	
  they	
  are	
  going	
  to	
  cure	
  cancer	
  
•  No	
  administrator	
  thinks	
  they	
  can	
  ever	
  be	
  perfectly	
  secure	
  
•  Diseases	
  are	
  “managed”,	
  very	
  few	
  are	
  ever	
  eliminated	
  
•  Very	
  few	
  classes	
  of	
  vulnerabiliEes	
  are	
  ever	
  eliminated	
  
•  It	
  is	
  possible	
  to	
  be	
  re-­‐infected	
  
•  A	
  new	
  variant	
  of	
  an	
  old	
  vulnerability	
  can	
  re-­‐infect	
  your	
  systems	
  
This	
  is	
  a	
  healthy	
  way	
  of	
  thinking	
  
Perimeter	
  security	
  
Involves:	
  
Security	
  department	
  
IT	
  department	
  
ApplicaEon	
  teams	
  
an	
  arEst	
  Babis	
  Cloud	
  has	
  made	
  'hedonIsM(y)	
  trojaner',	
  an	
  installaEon	
  of	
  the	
  ancient	
  greek	
  trojan	
  horse	
  from	
  computer	
  keyboard	
  bu
They	
  are	
  already	
  inside	
  your	
  perimeter	
  
Involves:	
  
Security	
  department 	
   	
  Legal	
  department	
  
IT	
  department 	
   	
   	
  CommunicaEons	
  
ApplicaEon	
  teams 	
   	
  Risk	
  Management	
  
	
   	
   	
   	
   	
   	
  Public	
  RelaEons	
  
	
   	
   	
   	
   	
   	
  Finance	
  
	
   	
   	
   	
   	
   	
  R&D	
  
The	
  year	
  is	
  2014	
  
• You	
  sEll	
  can’t	
  send	
  secure	
  email	
  easily	
  
• You	
  can’t	
  have	
  a	
  secure	
  mobile	
  phone	
  call	
  
• Web	
  browsing	
  securely	
  is	
  essenEally	
  impossible	
  
• Name	
  resoluEon	
  is	
  insecure,	
  but	
  geqng	
  be@er	
  
Why?	
  What	
  has	
  failed	
  us?	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
sumers	
  can’t	
  make	
  informed	
  
Security	
  product	
  decisions	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
2000s	
  
• Insurance	
  
Pressure	
  
sumers	
  can’t	
  make	
  informed	
  
Security	
  product	
  decisions	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
2000s	
  
• Insurance	
  
Pressure	
  
sumers	
  can’t	
  make	
  informed	
  
Security	
  product	
  decisions	
  
Lack	
  of	
  data	
  prevents	
  the	
  
Crea>on	
  of	
  actuarial	
  tables	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
2000s	
  
• Insurance	
  
Pressure	
  
2010s	
  
• RegulaEons
sumers	
  can’t	
  make	
  informed	
  
Security	
  product	
  decisions	
  
Lack	
  of	
  data	
  prevents	
  the	
  
Crea>on	
  of	
  actuarial	
  tables	
  
We	
  are	
  running	
  out	
  of	
  opEons	
  
1990s	
  
• Consumer	
  
SelecEon	
  
2000s	
  
• Insurance	
  
Pressure	
  
2010s	
  
• RegulaEons
sumers	
  can’t	
  make	
  informed	
  
ecurity	
  product	
  decisions	
  
Lack	
  of	
  data	
  prevents	
  the	
  
crea>on	
  of	
  actuarial	
  tables	
  
Governments	
  are	
  reluctant
regulate	
  the	
  fast	
  moving	
  inte
That	
  leaves	
  us	
  
We	
  must	
  provide	
  leadership	
  and	
  direcEon	
  where	
  
and	
  when	
  we	
  can	
  
We	
  need	
  to	
  help	
  companies	
  do	
  the	
  right	
  thing	
  
through	
  educaEon	
  and	
  configuraEon	
  
“First, Do No Harm” -Auguste François Chomel, 1847
Primum	
  non	
  nocere	
  
“SomeEmes	
  it	
  may	
  be	
  be@er	
  to	
  not	
  do	
  something,	
  or	
  even	
  be@er	
  to	
  do	
  
nothing,	
  than	
  to	
  risk	
  causing	
  more	
  harm	
  than	
  good.”	
  
“First, Do No Harm” -Auguste François Chomel, 1847
To	
  me	
  this	
  can	
  be	
  applied	
  to	
  informaEon	
  security	
  when	
  thought	
  of	
  as	
  a	
  
public	
  safety	
  issue:	
  
•  Do	
  no	
  harm	
  to	
  the	
  trust	
  of	
  users	
  –	
  be	
  open	
  about	
  your	
  policies	
  
•  Be	
  honest	
  about	
  the	
  risks	
  of	
  using	
  technology	
  
•  Do	
  not	
  let	
  wishful	
  thinking	
  influence	
  your	
  decisions	
  
Community Immunity
(Also	
  known	
  as	
  Herd	
  Immunity	
  Theory)	
  
“A	
  form	
  of	
  immunity	
  that	
  occurs	
  when	
  the	
  vaccinaEon	
  
of	
  a	
  significant	
  porEon	
  of	
  a	
  populaEon	
  provides	
  a	
  
measure	
  of	
  protecEon	
  for	
  individuals	
  who	
  have	
  not	
  
developed	
  immunity.”	
  
Three Modes of Immunity
Three Modes of Immunity
Three Modes of Immunity
Community Immunity only applies to
diseases that are contagious
Disease	
   	
  Transmission 	
  Immunity	
  threshold	
  
Mumps	
   	
  Airborne	
  droplet	
   	
  75	
  -­‐	
  86%	
  
Pertussis	
   	
  Airborne	
  droplet	
   	
  92	
  -­‐	
  94%	
  
Rubella	
   	
  Airborne	
  droplet	
   	
  80	
  -­‐	
  85%	
  
Smallpox	
   	
  Social	
  contact	
   	
  83	
  -­‐	
  85%	
  
1.  No	
  one	
  is	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  through	
  the	
  
populaEon	
  
2.  Some	
  of	
  the	
  populaEon	
  gets	
  immunized	
  –	
  Contagious	
  disease	
  
spreads	
  through	
  some	
  of	
  the	
  populaEon	
  
3.  Most	
  of	
  the	
  populaEon	
  is	
  immunized	
  –	
  Spread	
  of	
  contagious	
  
disease	
  is	
  contained	
  
Three Modes of Immunity
1.  No	
  one	
  is	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  through	
  the	
  
populaEon	
  
Networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  spreads	
  through	
  
networks	
  without	
  noEce	
  and	
  li@le	
  to	
  stop	
  them	
  
2.  Some	
  of	
  the	
  populaEon	
  gets	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  
through	
  some	
  of	
  the	
  populaEon	
  
3.  Most	
  of	
  the	
  populaEon	
  is	
  immunized	
  –	
  Spread	
  of	
  contagious	
  disease	
  is	
  
contained	
  
Three Modes of Immunity
1.  No	
  one	
  is	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  through	
  the	
  
populaEon	
  
Networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  spreads	
  through	
  
networks	
  without	
  noEce	
  and	
  li@le	
  to	
  stop	
  them	
  
2.  Some	
  of	
  the	
  populaEon	
  gets	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  
through	
  some	
  of	
  the	
  populaEon	
  
Some	
  networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  is	
  someEmes	
  
noEced	
  and	
  removed,	
  and	
  spreads	
  through	
  some	
  of	
  the	
  populaEon	
  
3.  Most	
  of	
  the	
  populaEon	
  is	
  immunized	
  –	
  Spread	
  of	
  contagious	
  disease	
  is	
  
contained	
  
Three Modes of Immunity
1.  No	
  one	
  is	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  through	
  the	
  
populaEon	
  
Networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  spreads	
  through	
  
networks	
  without	
  noEce	
  and	
  li@le	
  to	
  stop	
  them	
  
2.  Some	
  of	
  the	
  populaEon	
  gets	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  
through	
  some	
  of	
  the	
  populaEon	
  
Some	
  networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  is	
  someEmes	
  
noEced	
  and	
  removed,	
  and	
  spreads	
  through	
  some	
  of	
  the	
  populaEon	
  
3.  Most	
  of	
  the	
  populaEon	
  is	
  immunized	
  –	
  Spread	
  of	
  contagious	
  disease	
  is	
  
contained	
  
Most	
  all	
  networks	
  and	
  systems	
  are	
  maintained	
  –	
  Malware	
  is	
  noEced	
  most	
  
of	
  the	
  Eme	
  and	
  removed,	
  acEons	
  are	
  taken	
  to	
  protect	
  other	
  systems	
  
besides	
  your	
  own.	
  
Three Modes of Immunity
1.  No	
  one	
  is	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  through	
  the	
  
populaEon	
  
Networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  spreads	
  through	
  
networks	
  without	
  noEce	
  and	
  li@le	
  to	
  stop	
  them	
  
2.  Some	
  of	
  the	
  populaEon	
  gets	
  immunized	
  –	
  Contagious	
  disease	
  spreads	
  
through	
  some	
  of	
  the	
  populaEon	
  
Some	
  networks	
  and	
  systems	
  are	
  not	
  maintained	
  –	
  Malware	
  is	
  someEmes	
  
noEced	
  and	
  removed,	
  and	
  spreads	
  through	
  some	
  of	
  the	
  populaEon	
  
3.  Most	
  of	
  the	
  populaEon	
  is	
  immunized	
  –	
  Spread	
  of	
  contagious	
  disease	
  is	
  
contained	
  
Most	
  all	
  networks	
  and	
  systems	
  are	
  maintained	
  –	
  Malware	
  is	
  noEced	
  most	
  
of	
  the	
  Eme	
  and	
  removed,	
  acEons	
  are	
  taken	
  to	
  protect	
  other	
  systems	
  
besides	
  your	
  own.	
  
Three Modes of Immunity
Firewall	
  as	
  VaccinaEon?	
  
Vaccinate	
  yourself	
  and	
  others	
  
Can	
  protecEng	
  your	
  network	
  and	
  systems	
  with	
  a	
  firewall	
  or	
  
router	
  act	
  as	
  a	
  “virtual	
  vaccine”?	
  
Can	
  your	
  network	
  peers	
  get	
  a	
  conferred	
  benefit?	
  
Don’t	
  do	
  anything	
  addiEonal	
  on	
  your	
  network	
  
Don’t	
  go	
  out	
  of	
  your	
  way	
  to	
  monitor	
  your	
  systems	
  
Don’t	
  stay	
  up	
  to	
  date	
  on	
  patches	
  or	
  applicaEon	
  updates	
  
Do	
  Nothing	
  or	
  “Not	
  Immunized”	
  
Do	
  Nothing	
  or	
  “Not	
  Immunized”	
  
PRO:	
  
• Least	
  expensive	
  opEon,	
  no	
  training	
  or	
  changes	
  necessary	
  
• Requires	
  no	
  network	
  or	
  applicaEon	
  modificaEons	
  
CON:	
  
• You	
  are	
  part	
  of	
  the	
  problem	
  and	
  possibly	
  causing	
  harm	
  
• There	
  might	
  be	
  legal	
  consequences	
  
Protect	
  your	
  systems	
  and	
  applicaEons,	
  but	
  not	
  those	
  of	
  others	
  
Protect	
  only	
  yourself	
  or	
  “ParEally	
  Immunized”	
  
Protect	
  your	
  systems	
  and	
  applicaEons,	
  but	
  not	
  those	
  of	
  others	
  
Examples:	
  
•  Secure	
  your	
  systems	
  by	
  patching,	
  updaEng,	
  selecEng	
  good	
  sojware	
  
•  Filter	
  spoofed	
  inbound	
  traffic	
  to	
  your	
  network,	
  but	
  not	
  outbound	
  
•  Enable	
  DNSSEC	
  validaEon	
  on	
  your	
  DNS,	
  but	
  do	
  not	
  sign	
  your	
  zones	
  
•  Limit	
  spam	
  by	
  checking	
  for	
  SPF	
  records	
  and	
  using	
  DNS	
  blackholes,	
  but	
  
not	
  publishing	
  your	
  own	
  SPF	
  records	
  
Protect	
  only	
  yourself	
  or	
  “ParEally	
  Immunized”	
  
Protect only yourself or “Partially
Immunized”
PRO:	
  
•  Lower	
  cost	
  that	
  being	
  fully	
  immunized	
  
•  You	
  are	
  be@er	
  protecEng	
  your	
  systems	
  against	
  misuse	
  by	
  others	
  
CON:	
  
•  You	
  only	
  take	
  acEons	
  that	
  protect	
  your	
  systems	
  –	
  not	
  those	
  of	
  others	
  
•  Higher	
  management	
  and	
  configuraEon	
  overhead	
  
Same	
  as	
  “ParEally	
  Immunized”	
  but	
  you	
  take	
  addiEonal	
  acEons	
  	
  
to	
  protect	
  those	
  around	
  you.	
  
Protect yourself and others or “Fully
Immunized”
Same	
  as	
  “ParEally	
  Immunized”	
  but	
  you	
  take	
  addiEonal	
  acEons	
  
to	
  protect	
  those	
  around	
  you.	
  
Examples:	
  
•  Prevent	
  source	
  address	
  spoofing	
  from	
  leaving	
  your	
  network	
  
•  DNSSEC	
  sign	
  your	
  zone	
  files	
  so	
  others	
  can	
  rely	
  on	
  the	
  data	
  
•  Disable	
  recursion	
  on	
  your	
  name	
  servers	
  to	
  limit	
  AMP	
  a@acks	
  
•  Publish	
  an	
  SPF	
  record	
  to	
  reduce	
  spam	
  by	
  telling	
  other	
  networks	
  about	
  
your	
  mail	
  server	
  
Protect yourself and others or “Fully
Immunized”
Protect yourself and others or “Fully
Immunized”
PRO:	
  
•  You	
  are	
  “conferring	
  an	
  immunity”	
  to	
  some	
  degree	
  to	
  others	
  
•  	
  Most	
  beneficial	
  to	
  all	
  users	
  of	
  the	
  internet	
  
•  	
  Best	
  security	
  stance	
  for	
  yourself	
  and	
  those	
  around	
  you	
  
CON:	
  
•  	
  Most	
  expensive	
  to	
  maintain	
  due	
  to	
  configuraEon	
  maintenance	
  
•  	
  You	
  need	
  be@er	
  trained	
  staff	
  to	
  stay	
  current	
  on	
  best	
  pracEces	
  
DNSSEC	
  is	
  available	
  to	
  the	
  majority	
  of	
  internet	
  users	
  	
  
https://www.dnssec-deployment.org/
What	
  if	
  you	
  don’t	
  own	
  or	
  operate	
  a	
  network?	
  
Donate	
  Resources	
  
Donate resources
Donate resources
h?p://folding.stanford.edu/	
  
Different communities
Companies	
  
Governments	
  
Individuals	
  
Think	
  of	
  the	
  Future	
  
Next	
  GeneraEon	
  technologies	
  are	
  starEng	
  to	
  be	
  deployed	
  
Can	
  we	
  use	
  them	
  to	
  help	
  protect	
  ourselves	
  and	
  others?	
  
DNSSEC	
  =	
  You	
  can	
  trust	
  the	
  answers	
  from	
  DNS	
  
DANE	
  =	
  Risk	
  of	
  rogue	
  SSL	
  CAs	
  virtually	
  eliminated	
  
IPv6	
  =	
  IPSEC	
  support,	
  less	
  NAT,	
  be@er	
  a@ribuEon,	
  future	
  growth
Has	
  thinking	
  about	
  network	
  heath	
  in	
  a	
  public	
  safety	
  light	
  helped?
Keynote : CODE BLUE in the ICU! by Jeff Moss

More Related Content

What's hot

Tech-Life Balance: Perception Vs. Reality
Tech-Life Balance: Perception Vs. RealityTech-Life Balance: Perception Vs. Reality
Tech-Life Balance: Perception Vs. RealityCrucial.com
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011Houston ISD
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Jeffrey Evans Presentation
Jeffrey Evans PresentationJeffrey Evans Presentation
Jeffrey Evans PresentationMediabistro
 
AI Risk Consensus: 20 Years Projections and Predictions
AI Risk Consensus: 20 Years Projections and PredictionsAI Risk Consensus: 20 Years Projections and Predictions
AI Risk Consensus: 20 Years Projections and PredictionsEmerj
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

What's hot (9)

Tech-Life Balance: Perception Vs. Reality
Tech-Life Balance: Perception Vs. RealityTech-Life Balance: Perception Vs. Reality
Tech-Life Balance: Perception Vs. Reality
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Jeffrey Evans Presentation
Jeffrey Evans PresentationJeffrey Evans Presentation
Jeffrey Evans Presentation
 
AI Risk Consensus: 20 Years Projections and Predictions
AI Risk Consensus: 20 Years Projections and PredictionsAI Risk Consensus: 20 Years Projections and Predictions
AI Risk Consensus: 20 Years Projections and Predictions
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

Viewers also liked

Presentation on emergency codes in a hospital
Presentation on emergency  codes  in a hospitalPresentation on emergency  codes  in a hospital
Presentation on emergency codes in a hospitalLakshmi Kala
 
Code blue
Code blueCode blue
Code bluewcmc
 
Enhancing Code Blue Performance with xAPI
Enhancing Code Blue Performance with xAPIEnhancing Code Blue Performance with xAPI
Enhancing Code Blue Performance with xAPIWatershed
 
Learning to act like a nurse
Learning to act like a nurseLearning to act like a nurse
Learning to act like a nurseRichard Talbot
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursingAlisha Rijal
 
A health care system that fits nursing values dec 9, 2010 1 ceu
A health care system that fits nursing values dec 9, 2010 1 ceuA health care system that fits nursing values dec 9, 2010 1 ceu
A health care system that fits nursing values dec 9, 2010 1 ceuJoel Clemmer
 
The referral process as imagined versus the referral process as done: co-deve...
The referral process as imagined versus the referral process as done: co-deve...The referral process as imagined versus the referral process as done: co-deve...
The referral process as imagined versus the referral process as done: co-deve...Cancer Institute NSW
 
Fire safety and codes
Fire safety and codesFire safety and codes
Fire safety and codeswcmc
 
Appointment Book Sample and Manual
Appointment Book Sample and ManualAppointment Book Sample and Manual
Appointment Book Sample and ManualApril Schuetze
 
Values in Nursing
Values in NursingValues in Nursing
Values in NursingKarla Ruiz
 
Welcome to the launch of Leading Change, Adding Value
Welcome to the launch of Leading Change, Adding ValueWelcome to the launch of Leading Change, Adding Value
Welcome to the launch of Leading Change, Adding ValueNHS England
 
Shouldice Presentation Outline
Shouldice Presentation OutlineShouldice Presentation Outline
Shouldice Presentation Outlineppdean
 
Nursing ethics
Nursing ethicsNursing ethics
Nursing ethicshab1978
 
Management protools in icu
Management protools in icuManagement protools in icu
Management protools in icuSurendra Patel
 

Viewers also liked (20)

Presentation on emergency codes in a hospital
Presentation on emergency  codes  in a hospitalPresentation on emergency  codes  in a hospital
Presentation on emergency codes in a hospital
 
Code blue
Code blueCode blue
Code blue
 
RESUME_TARADATT
RESUME_TARADATTRESUME_TARADATT
RESUME_TARADATT
 
Enhancing Code Blue Performance with xAPI
Enhancing Code Blue Performance with xAPIEnhancing Code Blue Performance with xAPI
Enhancing Code Blue Performance with xAPI
 
Learning to act like a nurse
Learning to act like a nurseLearning to act like a nurse
Learning to act like a nurse
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursing
 
A health care system that fits nursing values dec 9, 2010 1 ceu
A health care system that fits nursing values dec 9, 2010 1 ceuA health care system that fits nursing values dec 9, 2010 1 ceu
A health care system that fits nursing values dec 9, 2010 1 ceu
 
The referral process as imagined versus the referral process as done: co-deve...
The referral process as imagined versus the referral process as done: co-deve...The referral process as imagined versus the referral process as done: co-deve...
The referral process as imagined versus the referral process as done: co-deve...
 
Code Blue
 Code Blue Code Blue
Code Blue
 
Fire safety and codes
Fire safety and codesFire safety and codes
Fire safety and codes
 
Appointment Book Sample and Manual
Appointment Book Sample and ManualAppointment Book Sample and Manual
Appointment Book Sample and Manual
 
Values in Nursing
Values in NursingValues in Nursing
Values in Nursing
 
Emerg codes 1
Emerg codes 1Emerg codes 1
Emerg codes 1
 
Welcome to the launch of Leading Change, Adding Value
Welcome to the launch of Leading Change, Adding ValueWelcome to the launch of Leading Change, Adding Value
Welcome to the launch of Leading Change, Adding Value
 
Shouldice Presentation Outline
Shouldice Presentation OutlineShouldice Presentation Outline
Shouldice Presentation Outline
 
Nursing ethics
Nursing ethicsNursing ethics
Nursing ethics
 
Code management
Code managementCode management
Code management
 
Rapid response team
Rapid response teamRapid response team
Rapid response team
 
Intensive care Units Role of Nursing
Intensive care Units Role of Nursing Intensive care Units Role of Nursing
Intensive care Units Role of Nursing
 
Management protools in icu
Management protools in icuManagement protools in icu
Management protools in icu
 

Similar to Keynote : CODE BLUE in the ICU! by Jeff Moss

Presentation what if the whole world is bad in data-driven decision-making ...
Presentation   what if the whole world is bad in data-driven decision-making ...Presentation   what if the whole world is bad in data-driven decision-making ...
Presentation what if the whole world is bad in data-driven decision-making ...Sami Laine
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015Claus Cramon Houmann
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSOAlexander Hutton
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikYogesh Malik
 
Veillant Media & Emotiveillance
Veillant Media & Emotiveillance  Veillant Media & Emotiveillance
Veillant Media & Emotiveillance Andrew_McStay
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךgkurtz
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Essay Websites Examples Of A Per
Essay Websites Examples Of A PerEssay Websites Examples Of A Per
Essay Websites Examples Of A PerDaphne Smith
 
Running Head Hyper mode emergency notification system .docx
Running Head Hyper mode emergency notification system            .docxRunning Head Hyper mode emergency notification system            .docx
Running Head Hyper mode emergency notification system .docxcowinhelen
 
Interesting Research Paper Topics For Kids - 50 Scien
Interesting Research Paper Topics For Kids - 50 ScienInteresting Research Paper Topics For Kids - 50 Scien
Interesting Research Paper Topics For Kids - 50 ScienMichelle Benedict
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-toolsAhmed-Refat Refat
 
The Cyber Pandemic - Jay bavisi
The Cyber Pandemic - Jay bavisiThe Cyber Pandemic - Jay bavisi
The Cyber Pandemic - Jay bavisiEC-Council
 
Scientific Triage: How to make strategic choices about prioritizing basic sci...
Scientific Triage: How to make strategic choices about prioritizing basic sci...Scientific Triage: How to make strategic choices about prioritizing basic sci...
Scientific Triage: How to make strategic choices about prioritizing basic sci...nfefferman
 
AAN 2015 - iTalk - Social Media
AAN 2015 - iTalk - Social MediaAAN 2015 - iTalk - Social Media
AAN 2015 - iTalk - Social MediaMakala Arce
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraDiane Rasmussen Pennington
 
How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...SharpBrains
 

Similar to Keynote : CODE BLUE in the ICU! by Jeff Moss (20)

Presentation what if the whole world is bad in data-driven decision-making ...
Presentation   what if the whole world is bad in data-driven decision-making ...Presentation   what if the whole world is bad in data-driven decision-making ...
Presentation what if the whole world is bad in data-driven decision-making ...
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh Malik
 
Veillant Media & Emotiveillance
Veillant Media & Emotiveillance  Veillant Media & Emotiveillance
Veillant Media & Emotiveillance
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Essay Websites Examples Of A Per
Essay Websites Examples Of A PerEssay Websites Examples Of A Per
Essay Websites Examples Of A Per
 
Running Head Hyper mode emergency notification system .docx
Running Head Hyper mode emergency notification system            .docxRunning Head Hyper mode emergency notification system            .docx
Running Head Hyper mode emergency notification system .docx
 
Social Technologies for eHealth
Social Technologies for eHealthSocial Technologies for eHealth
Social Technologies for eHealth
 
Interesting Research Paper Topics For Kids - 50 Scien
Interesting Research Paper Topics For Kids - 50 ScienInteresting Research Paper Topics For Kids - 50 Scien
Interesting Research Paper Topics For Kids - 50 Scien
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-tools
 
The Cyber Pandemic - Jay bavisi
The Cyber Pandemic - Jay bavisiThe Cyber Pandemic - Jay bavisi
The Cyber Pandemic - Jay bavisi
 
Scientific Triage: How to make strategic choices about prioritizing basic sci...
Scientific Triage: How to make strategic choices about prioritizing basic sci...Scientific Triage: How to make strategic choices about prioritizing basic sci...
Scientific Triage: How to make strategic choices about prioritizing basic sci...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
AAN 2015 - iTalk - Social Media
AAN 2015 - iTalk - Social MediaAAN 2015 - iTalk - Social Media
AAN 2015 - iTalk - Social Media
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 era
 
How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Keynote : CODE BLUE in the ICU! by Jeff Moss

  • 1. Code Blue in the ICU! Thinking  about  network  safety  in  a  public  health  light   ©  Jeff  Moss  –  jm@defcon.org  
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 15. 1. NaEon  States  want  SECRETS   2. Organized  Criminals  want  MONEY  
  • 16. 1. NaEon  States  want  SECRETS   2. Organized  Criminals  want  MONEY   3. Protesters  want  ATTENTION  
  • 17. 1. NaEon  States  want  SECRETS   2. Organized  Criminals  want  MONEY   3. Protesters  want  ATTENTION   4. Hackers  &  researchers  want   KNOWLEDGE  
  • 18. 1. NaEon  States  want  SECRETS   2. Organized  Criminals  want  MONEY   3. Protesters  want  ATTENTION   4. Hackers  &  researchers  want   KNOWLEDGE   That’s  you  guys!  
  • 19. Hackers  &  Researchers  point  the  way!   -­‐ Discover  new  classes  of  vulnerabiliEes   -­‐ Expose  poor  product  security   -­‐ Spur  public  debate  
  • 20. Hackers  &  Researchers  point  the  way!   -­‐ Discover  new  classes  of  vulnerabiliEes   -­‐ Expose  poor  product  security   -­‐ Spur  public  debate   Criminals  and  Governments  don’t  do  this   It’s  not  in  their  interests  
  • 21. All  these  groups  need  the  net  to  work  
  • 22. Q:  What  if  there  is  a  5th  group  that  doesn’t?  
  • 23. Denial of service is increasing 0   00   00   00   00   00   00   00   2010   2011   Mar-­‐12   Oct-­‐12   Apr-­‐13   Feb-­‐14   Sept-­‐14  ?   DDoS  in  Gigabits  per  second   Gps  fl ?   NTP  RAMP   CloudFlare   DNS  RAMP   SpamHaus  
  • 24. When  invesEng:   Specialize  for  larger  risk  /  returns  
  • 25. When  invesEng:   Specialize  for  larger  risk  /  returns   Diversify  to  reduce  risk  /  returns  
  • 26. We  now  have  clouds  of  complexity  
  • 27. We  have  virtual  clouds  of  complexity  
  • 28. The  failure  modes  of  Complex  systems   are  impossible  to  predict  
  • 29.
  • 30.
  • 31. I  like  the  Code  Blue  press  release   “Code  Blue  is  a  hospital  emergency  code  that  indicates  a  paEent  in   need  of  immediate  medical  a@enEon,  or  that  calls  for  relevant  teams  to   respond  immediately.  We  named  the  conference  ajer  the  code   because  we  hope  to  save  the  world  by  combining  people’s  knowledge”   h@p://japandailypress.com/white-­‐hat-­‐hackers-­‐to-­‐gather-­‐at-­‐code-­‐blue-­‐cybersecurity-­‐conference-­‐in-­‐tokyo-­‐1043926/  
  • 32. Public  health  analogy   •  No  one  thinks  they  are  going  to  cure  cancer   •  Diseases  are  “managed”,  very  few  are  ever  eliminated   •  It  is  possible  to  be  re-­‐infected  
  • 33. Public  health  analogy   •  No  one  thinks  they  are  going  to  cure  cancer   •  No  administrator  thinks  they  can  ever  be  perfectly  secure   •  Diseases  are  “managed”,  very  few  are  ever  eliminated   •  Very  few  classes  of  vulnerabiliEes  are  ever  eliminated   •  It  is  possible  to  be  re-­‐infected   •  A  new  variant  of  an  old  vulnerability  can  re-­‐infect  your  systems  
  • 34. This  is  a  healthy  way  of  thinking  
  • 35.
  • 36. Perimeter  security   Involves:   Security  department   IT  department   ApplicaEon  teams  
  • 37.
  • 38. an  arEst  Babis  Cloud  has  made  'hedonIsM(y)  trojaner',  an  installaEon  of  the  ancient  greek  trojan  horse  from  computer  keyboard  bu
  • 39. They  are  already  inside  your  perimeter   Involves:   Security  department    Legal  department   IT  department      CommunicaEons   ApplicaEon  teams    Risk  Management              Public  RelaEons              Finance              R&D  
  • 40. The  year  is  2014   • You  sEll  can’t  send  secure  email  easily   • You  can’t  have  a  secure  mobile  phone  call   • Web  browsing  securely  is  essenEally  impossible   • Name  resoluEon  is  insecure,  but  geqng  be@er   Why?  What  has  failed  us?  
  • 41. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon  
  • 42. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon   sumers  can’t  make  informed   Security  product  decisions  
  • 43. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon   2000s   • Insurance   Pressure   sumers  can’t  make  informed   Security  product  decisions  
  • 44. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon   2000s   • Insurance   Pressure   sumers  can’t  make  informed   Security  product  decisions   Lack  of  data  prevents  the   Crea>on  of  actuarial  tables  
  • 45. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon   2000s   • Insurance   Pressure   2010s   • RegulaEons sumers  can’t  make  informed   Security  product  decisions   Lack  of  data  prevents  the   Crea>on  of  actuarial  tables  
  • 46. We  are  running  out  of  opEons   1990s   • Consumer   SelecEon   2000s   • Insurance   Pressure   2010s   • RegulaEons sumers  can’t  make  informed   ecurity  product  decisions   Lack  of  data  prevents  the   crea>on  of  actuarial  tables   Governments  are  reluctant regulate  the  fast  moving  inte
  • 47. That  leaves  us   We  must  provide  leadership  and  direcEon  where   and  when  we  can   We  need  to  help  companies  do  the  right  thing   through  educaEon  and  configuraEon  
  • 48. “First, Do No Harm” -Auguste François Chomel, 1847 Primum  non  nocere   “SomeEmes  it  may  be  be@er  to  not  do  something,  or  even  be@er  to  do   nothing,  than  to  risk  causing  more  harm  than  good.”  
  • 49. “First, Do No Harm” -Auguste François Chomel, 1847 To  me  this  can  be  applied  to  informaEon  security  when  thought  of  as  a   public  safety  issue:   •  Do  no  harm  to  the  trust  of  users  –  be  open  about  your  policies   •  Be  honest  about  the  risks  of  using  technology   •  Do  not  let  wishful  thinking  influence  your  decisions  
  • 50. Community Immunity (Also  known  as  Herd  Immunity  Theory)   “A  form  of  immunity  that  occurs  when  the  vaccinaEon   of  a  significant  porEon  of  a  populaEon  provides  a   measure  of  protecEon  for  individuals  who  have  not   developed  immunity.”  
  • 51. Three Modes of Immunity
  • 52. Three Modes of Immunity
  • 53. Three Modes of Immunity
  • 54. Community Immunity only applies to diseases that are contagious Disease    Transmission  Immunity  threshold   Mumps    Airborne  droplet    75  -­‐  86%   Pertussis    Airborne  droplet    92  -­‐  94%   Rubella    Airborne  droplet    80  -­‐  85%   Smallpox    Social  contact    83  -­‐  85%  
  • 55. 1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the   populaEon   2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease   spreads  through  some  of  the  populaEon   3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious   disease  is  contained   Three Modes of Immunity
  • 56. 1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the   populaEon   Networks  and  systems  are  not  maintained  –  Malware  spreads  through   networks  without  noEce  and  li@le  to  stop  them   2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads   through  some  of  the  populaEon   3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is   contained   Three Modes of Immunity
  • 57. 1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the   populaEon   Networks  and  systems  are  not  maintained  –  Malware  spreads  through   networks  without  noEce  and  li@le  to  stop  them   2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads   through  some  of  the  populaEon   Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes   noEced  and  removed,  and  spreads  through  some  of  the  populaEon   3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is   contained   Three Modes of Immunity
  • 58. 1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the   populaEon   Networks  and  systems  are  not  maintained  –  Malware  spreads  through   networks  without  noEce  and  li@le  to  stop  them   2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads   through  some  of  the  populaEon   Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes   noEced  and  removed,  and  spreads  through  some  of  the  populaEon   3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is   contained   Most  all  networks  and  systems  are  maintained  –  Malware  is  noEced  most   of  the  Eme  and  removed,  acEons  are  taken  to  protect  other  systems   besides  your  own.   Three Modes of Immunity
  • 59. 1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the   populaEon   Networks  and  systems  are  not  maintained  –  Malware  spreads  through   networks  without  noEce  and  li@le  to  stop  them   2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads   through  some  of  the  populaEon   Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes   noEced  and  removed,  and  spreads  through  some  of  the  populaEon   3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is   contained   Most  all  networks  and  systems  are  maintained  –  Malware  is  noEced  most   of  the  Eme  and  removed,  acEons  are  taken  to  protect  other  systems   besides  your  own.   Three Modes of Immunity
  • 61. Vaccinate  yourself  and  others   Can  protecEng  your  network  and  systems  with  a  firewall  or   router  act  as  a  “virtual  vaccine”?   Can  your  network  peers  get  a  conferred  benefit?  
  • 62. Don’t  do  anything  addiEonal  on  your  network   Don’t  go  out  of  your  way  to  monitor  your  systems   Don’t  stay  up  to  date  on  patches  or  applicaEon  updates   Do  Nothing  or  “Not  Immunized”  
  • 63. Do  Nothing  or  “Not  Immunized”   PRO:   • Least  expensive  opEon,  no  training  or  changes  necessary   • Requires  no  network  or  applicaEon  modificaEons   CON:   • You  are  part  of  the  problem  and  possibly  causing  harm   • There  might  be  legal  consequences  
  • 64. Protect  your  systems  and  applicaEons,  but  not  those  of  others   Protect  only  yourself  or  “ParEally  Immunized”  
  • 65. Protect  your  systems  and  applicaEons,  but  not  those  of  others   Examples:   •  Secure  your  systems  by  patching,  updaEng,  selecEng  good  sojware   •  Filter  spoofed  inbound  traffic  to  your  network,  but  not  outbound   •  Enable  DNSSEC  validaEon  on  your  DNS,  but  do  not  sign  your  zones   •  Limit  spam  by  checking  for  SPF  records  and  using  DNS  blackholes,  but   not  publishing  your  own  SPF  records   Protect  only  yourself  or  “ParEally  Immunized”  
  • 66. Protect only yourself or “Partially Immunized” PRO:   •  Lower  cost  that  being  fully  immunized   •  You  are  be@er  protecEng  your  systems  against  misuse  by  others   CON:   •  You  only  take  acEons  that  protect  your  systems  –  not  those  of  others   •  Higher  management  and  configuraEon  overhead  
  • 67. Same  as  “ParEally  Immunized”  but  you  take  addiEonal  acEons     to  protect  those  around  you.   Protect yourself and others or “Fully Immunized”
  • 68. Same  as  “ParEally  Immunized”  but  you  take  addiEonal  acEons   to  protect  those  around  you.   Examples:   •  Prevent  source  address  spoofing  from  leaving  your  network   •  DNSSEC  sign  your  zone  files  so  others  can  rely  on  the  data   •  Disable  recursion  on  your  name  servers  to  limit  AMP  a@acks   •  Publish  an  SPF  record  to  reduce  spam  by  telling  other  networks  about   your  mail  server   Protect yourself and others or “Fully Immunized”
  • 69. Protect yourself and others or “Fully Immunized” PRO:   •  You  are  “conferring  an  immunity”  to  some  degree  to  others   •   Most  beneficial  to  all  users  of  the  internet   •   Best  security  stance  for  yourself  and  those  around  you   CON:   •   Most  expensive  to  maintain  due  to  configuraEon  maintenance   •   You  need  be@er  trained  staff  to  stay  current  on  best  pracEces  
  • 70. DNSSEC  is  available  to  the  majority  of  internet  users     https://www.dnssec-deployment.org/
  • 71. What  if  you  don’t  own  or  operate  a  network?  
  • 74.
  • 77.
  • 78. Think  of  the  Future   Next  GeneraEon  technologies  are  starEng  to  be  deployed   Can  we  use  them  to  help  protect  ourselves  and  others?   DNSSEC  =  You  can  trust  the  answers  from  DNS   DANE  =  Risk  of  rogue  SSL  CAs  virtually  eliminated   IPv6  =  IPSEC  support,  less  NAT,  be@er  a@ribuEon,  future  growth
  • 79. Has  thinking  about  network  heath  in  a  public  safety  light  helped?