Submit Search
Upload
Application security as crucial to the modern distributed trust model
•
0 likes
•
4,683 views
LINE Corporation
Follow
LINE and intertrust security summit (c)Intertrust
Read less
Read more
Technology
Report
Share
Report
Share
1 of 18
Download now
Download to read offline
Recommended
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
LINE Corporation
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
LINE Corporation
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
LINE Corporation
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
WSO2
Recommended
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
LINE Corporation
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
LINE Corporation
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
LINE Corporation
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
WSO2
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
Justin Hayward
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Gerry Elman
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
Turgay Dereli
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
AI Frontiers
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Mobile Security Research Projects Help
Mobile Security Research Projects Help
Network Simulation Tools
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure Software
Cesar Cerrudo
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
LINE Corporation
Prometheus casual talk1
Prometheus casual talk1
wyukawa
More Related Content
What's hot
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
Justin Hayward
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Gerry Elman
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
Turgay Dereli
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
AI Frontiers
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Mobile Security Research Projects Help
Mobile Security Research Projects Help
Network Simulation Tools
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure Software
Cesar Cerrudo
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
What's hot
(20)
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Mobile Security Research Projects Help
Mobile Security Research Projects Help
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure Software
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Viewers also liked
FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
LINE Corporation
Prometheus casual talk1
Prometheus casual talk1
wyukawa
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
Tokuhiro Matsuno
Prometheus on AWS
Prometheus on AWS
Mitsuhiro Tanda
ゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティ
LINE Corporation
Monitoring Kafka w/ Prometheus
Monitoring Kafka w/ Prometheus
kawamuray
Introduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
Viewers also liked
(7)
FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
Prometheus casual talk1
Prometheus casual talk1
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
Prometheus on AWS
Prometheus on AWS
ゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティ
Monitoring Kafka w/ Prometheus
Monitoring Kafka w/ Prometheus
Introduction to the FIDO Alliance
Introduction to the FIDO Alliance
Similar to Application security as crucial to the modern distributed trust model
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Trends in IoT 2017
Trends in IoT 2017
Dr Ganesh Iyer
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
Secure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
BeyondTrust
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
Strengthen Cloud Security
Strengthen Cloud Security
Lora O'Haver
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
lorzinian
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
AFCEA International
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
Marc Jadoul
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
dianadvo
Similar to Application security as crucial to the modern distributed trust model
(20)
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
Business Continuity and app Security
Business Continuity and app Security
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Trends in IoT 2017
Trends in IoT 2017
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Secure your Space: The Internet of Things
Secure your Space: The Internet of Things
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Strengthen Cloud Security
Strengthen Cloud Security
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Cyber Security Intelligence
Cyber Security Intelligence
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
More from LINE Corporation
JJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LT
LINE Corporation
Reduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin Coroutines
LINE Corporation
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
LINE Corporation
Use Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extension
LINE Corporation
The Magic of LINE 購物 Testing
The Magic of LINE 購物 Testing
LINE Corporation
GA Test Automation
GA Test Automation
LINE Corporation
UI Automation Test with JUnit5
UI Automation Test with JUnit5
LINE Corporation
Feature Detection for UI Testing
Feature Detection for UI Testing
LINE Corporation
LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享
LINE Corporation
LINE 技術合作夥伴與應用分享
LINE 技術合作夥伴與應用分享
LINE Corporation
LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣
LINE Corporation
日本開發者大會短講分享
日本開發者大會短講分享
LINE Corporation
LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享
LINE Corporation
在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes
LINE Corporation
LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧
LINE Corporation
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE Corporation
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
LINE Corporation
LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗
LINE Corporation
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Corporation
Keynote - LINE 的技術策略佈局與跨國產品開發
Keynote - LINE 的技術策略佈局與跨國產品開發
LINE Corporation
More from LINE Corporation
(20)
JJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LT
Reduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin Coroutines
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Use Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extension
The Magic of LINE 購物 Testing
The Magic of LINE 購物 Testing
GA Test Automation
GA Test Automation
UI Automation Test with JUnit5
UI Automation Test with JUnit5
Feature Detection for UI Testing
Feature Detection for UI Testing
LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享
LINE 技術合作夥伴與應用分享
LINE 技術合作夥伴與應用分享
LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣
日本開發者大會短講分享
日本開發者大會短講分享
LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享
在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes
LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務
Keynote - LINE 的技術策略佈局與跨國產品開發
Keynote - LINE 的技術策略佈局與跨國產品開發
Recently uploaded
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Recently uploaded
(20)
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Application security as crucial to the modern distributed trust model
1.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Application security as crucial to the modern distributed trust model LINE-Intertrust Security Summit 1 —Tokyo May 17, 2017 Dave Maher, CTO Intertrust
2.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Three drivers for Application layer security 2 1. Scale 2. Hyper-connectivity 3. Implications of Merger of the Cyber and Physical worlds
3.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Scale 3 20204 BILLION Connected People $4 TRILLION Revenue Opportunity 25+ MILLION Apps 25+ BILLION Embedded and Intelligent Systems 50 TRILLION GBs of Data
4.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Hyperconnectivity and dynamic and ephehemeral networks 4
5.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Merger of Cyber and Physical worlds bring huuuuge risks 5
6.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Isolation defeats the purpose of connectivity 6
7.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Ransomware and other malware 7
8.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Software self-defense addresses scale 8 Things must become responsible for themselves
9.
© 2017 Intertrust
Technologies Corporation. All rights reserved. 9
10.
© 2017 Intertrust
Technologies Corporation. All rights reserved. • Security within the device or application — self-defense • Security mechanisms that are simple for users, self-maintaining, inexpensive yet strong • Security can be lightweight yet strong • Defense-in-depth: Additional layers, including • Network security where appropriate • Cloud-based services that can detect patterns of illicit activity • Protection of application data and device sensor info • Protection of resources • Secure delegation: Make it easy to give access to legitimate users but hard for illicit users Trust models — what we rely on for Safety, Security, Privacy 10
11.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Model for an internet connected thing 11 Sensors Physical Interfaces Communications Security Associations Remote Controller Cloud Services Thing Remote Front Panel Status Security Manager
12.
© 2017 Intertrust
Technologies Corporation. All rights reserved. • Except by legitimate users • Part of a defensed in depth strategy • When a device or application appears on a network, don’t shout out too much • Incremental and tokenized discovery can keep things friendly for legitimate users • Protocols can help assure things appear uninteresting to illegitimate users Make valuable devices difficult to discover 12
13.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Reference Monitor 13 Reference Monitor Security Associations Audit Trail Device ControlsUser
14.
© 2017 Intertrust
Technologies Corporation. All rights reserved. • A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication • We can use a similar approach for authorization using Message Authentication Codes • We can include permissions in an SA authorizing use of commands or access to state and sensor data in a device or application • Keys are typically part of an SA • We can use cloud services to simplify SA management and associated key management for IoT devices and applications Security Associations 14
15.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Secure Key Vault 15 • Access to applications and devices can be protected using cryptographic keys in security associations • Need a secure place to keep them
16.
© 2017 Intertrust
Technologies Corporation. All rights reserved. • Collect behavior info from devices and applications • Learn normal behavior • Detect and classify anomalies • Determine threat thresholds • Set alarms and notifications • All without tipping off intruders Secure Telemetry and Threat Analytics 16
17.
© 2017 Intertrust
Technologies Corporation. All rights reserved. 1. When we design applications and IoT devices today we must keep in mind • Scale • Hyper-connectivity • Implications of Merger of the Cyber and Physical worlds 2. We CAN keep things simple and friendly but we must take care 17 Conclusion
18.
© 2017 Intertrust
Technologies Corporation. All rights reserved. Thank you
Download now