SlideShare a Scribd company logo
1 of 16
Download to read offline
© 2017 Intertrust Technologies Corporation. All rights reserved.
Drawing the Line Correctly: 

Enough Security, Everywhere
LINE-Intertrust Security Summit 1 —Tokyo

May 17, 2017
Talal G. Shamoon, CEO Intertrust
© 2017 Intertrust Technologies Corporation. All rights reserved.
Welcome to the 

first LINE-Intertrust
Security Summit
2© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
LINE-Intertrust 

Security Summit
• Meeting of the minds on modern
Internet secure systems

• Bring together business, research 

and products

• Open dialog to discuss challenges 

and solutions that the market faces
3© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
The Internet was never
designed with inherent
security in mind
Basic (huge) Problem
4© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
Because the bad guys

were assumed to be 

on the outside
The Internet was never designed 

with inherent security in mind
5
Basic Problem
© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
The security model was to 

“shoot the bad guys” when they 

came close to the computer
6© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
The Internet was originally
designed for military and
government communication
to be, resilient, robust and
distributed
7© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
1965-1975:
Multics — a “modern” operating system
for the new age …lots of cool security
concepts for its day
Multics failed. And the Bell Labs team
who worked on it wrote 

Unix — with little security…
8© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved. 9
http:// ++ +
= Security Circus
Fast forward: a few things happened…
© 2017 Intertrust Technologies Corporation. All rights reserved. 10
“We now find ourselves back fixing 

[the Internet] over and over again…”



“You keep saying, ‘Why didn’t we 

think about this?’ Well the answer is, 

it didn’t occur to us that there 

were criminals.”
Eric Schmidt @RSA2017 – Chairman, Alphabet
© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
It’s a great time to have a job in Secure Systems
Every day brings news of a new attack
Consumers and infrastructure are at peril
Need to understand convenience vs. security
1111
© 2017 Intertrust Technologies Corporation. All rights reserved. 12
Overlay the Internet and
operating systems with
appropriate security technologies
Need complete robust solutions
that go way beyond strong
cyphers
Secure run times, properly built
and deployed authentication and
strong hardware and software
tamper resistance
© 2017 Intertrust Technologies Corporation. All rights reserved.
Nijo-Jo: Tamper Resistance and
Authentication are not new…
13
…but not everyone needs the
Shogun’s interior decorator
13© 2017 Intertrust Technologies Corporation. All rights reserved.
© 2017 Intertrust Technologies Corporation. All rights reserved.
The right tool for the right job
14
People sometimes use security solutions that were too
strong in certain cases — bad for business
Secure systems design is a risk management exercise
— if a system is too hard to use, people wont use it
Understand the weaknesses and the threats, 

then deploy appropriate technology 

– but don’t forget that it’s all networked
© 2017 Intertrust Technologies Corporation. All rights reserved. 15
To bring focus on threats and solutions, 

LINE and Intertrust decided to create this conference series
Today is our first summit meeting to bring experts together 

to present research and discuss how to create 

a safe and business friendly Internet
Please enjoy!
© 2017 Intertrust Technologies Corporation. All rights reserved.
Image Attributions:

• Slides 2 & 3: Terakoya for Girls / (circa 1842-45) Bungaku Bandai no Takara by Issunnshi Hanasato / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slides 4 & 5: The Taking of Jericho / (circa 1896-1902) by James Jacques Joseph Tissot (French, 1836-1902) / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slides 6: U.S. Marine Corps photo by Sgt. Devin Nichols / U.S. Government Works

• Slide #7: Administrator Harry Trelogan and Agriculture Secretary Orville Freeman / (April 3, 2012) Photo courtesy of the National Archives and Records Administration / 

Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #8: Ken Thompson (sitting) & Dennis Ritchie at PDP-11 / (circa 1970) by Peter Hamer / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #10: Eric Schmidt, Executive Chairman of Google Inc., at the press conference about the e-G8 forum during the 37th G8 summit in Deauville, France / 

(February 3, 2013) derivative work: Sven Manguard / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #12: "We Can Do It!" poster for Westinghouse / by (1942) J. Howard Miller (1918–2004) / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #13: 

Plans of Nijō Castle / (2008) by vector image Gothika / Wikimedia Creative Commons (CC BY-SA 2.0), 

The secret of the squeaky Nightingale Floors - nails / (May 21, 2007) by Chris Gladis / Wikimedia Creative Commons (CC BY-SA 2.0),

Portrait of Tokugawa Ieyasu / by Kanō Tan’yū (1602–1674) / Wikimedia Creative Commons (CC BY-SA 2.0)
Thank you

More Related Content

What's hot

IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 

What's hot (20)

IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 

Viewers also liked (7)

FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
 
Prometheus casual talk1
Prometheus casual talk1Prometheus casual talk1
Prometheus casual talk1
 
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
 
ゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティ
 
Prometheus on AWS
Prometheus on AWSPrometheus on AWS
Prometheus on AWS
 
Monitoring Kafka w/ Prometheus
Monitoring Kafka w/ PrometheusMonitoring Kafka w/ Prometheus
Monitoring Kafka w/ Prometheus
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 

Similar to Drawing the Line Correctly: Enough Security, Everywhere

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
ClubHack
 

Similar to Drawing the Line Correctly: Enough Security, Everywhere (20)

Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security Briefing
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights |  Lastline, Inc.Infosec Europe 2017 Highlights |  Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Scalable Web3 Infrastructure with INFURA
Scalable Web3 Infrastructure with INFURAScalable Web3 Infrastructure with INFURA
Scalable Web3 Infrastructure with INFURA
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 

More from LINE Corporation

More from LINE Corporation (20)

JJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LTJJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LT
 
Reduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin CoroutinesReduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin Coroutines
 
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみたKotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
 
Use Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extensionUse Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extension
 
The Magic of LINE 購物 Testing
The Magic of LINE 購物 TestingThe Magic of LINE 購物 Testing
The Magic of LINE 購物 Testing
 
GA Test Automation
GA Test AutomationGA Test Automation
GA Test Automation
 
UI Automation Test with JUnit5
UI Automation Test with JUnit5UI Automation Test with JUnit5
UI Automation Test with JUnit5
 
Feature Detection for UI Testing
Feature Detection for UI TestingFeature Detection for UI Testing
Feature Detection for UI Testing
 
LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享
 
​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享
 
LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣
 
日本開發者大會短講分享
日本開發者大會短講分享日本開發者大會短講分享
日本開發者大會短講分享
 
LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享
 
在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes
 
LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧
 
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
 
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
 
LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗
 
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務
 
Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Drawing the Line Correctly: Enough Security, Everywhere

  • 1. © 2017 Intertrust Technologies Corporation. All rights reserved. Drawing the Line Correctly: 
 Enough Security, Everywhere LINE-Intertrust Security Summit 1 —Tokyo
 May 17, 2017 Talal G. Shamoon, CEO Intertrust
  • 2. © 2017 Intertrust Technologies Corporation. All rights reserved. Welcome to the 
 first LINE-Intertrust Security Summit 2© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 3. © 2017 Intertrust Technologies Corporation. All rights reserved. LINE-Intertrust 
 Security Summit • Meeting of the minds on modern Internet secure systems • Bring together business, research 
 and products • Open dialog to discuss challenges 
 and solutions that the market faces 3© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 4. © 2017 Intertrust Technologies Corporation. All rights reserved. The Internet was never designed with inherent security in mind Basic (huge) Problem 4© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 5. © 2017 Intertrust Technologies Corporation. All rights reserved. Because the bad guys
 were assumed to be 
 on the outside The Internet was never designed 
 with inherent security in mind 5 Basic Problem © 2017 Intertrust Technologies Corporation. All rights reserved.
  • 6. © 2017 Intertrust Technologies Corporation. All rights reserved. The security model was to 
 “shoot the bad guys” when they 
 came close to the computer 6© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 7. © 2017 Intertrust Technologies Corporation. All rights reserved. The Internet was originally designed for military and government communication to be, resilient, robust and distributed 7© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 8. © 2017 Intertrust Technologies Corporation. All rights reserved. 1965-1975: Multics — a “modern” operating system for the new age …lots of cool security concepts for its day Multics failed. And the Bell Labs team who worked on it wrote 
 Unix — with little security… 8© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 9. © 2017 Intertrust Technologies Corporation. All rights reserved. 9 http:// ++ + = Security Circus Fast forward: a few things happened…
  • 10. © 2017 Intertrust Technologies Corporation. All rights reserved. 10 “We now find ourselves back fixing 
 [the Internet] over and over again…”
 
 “You keep saying, ‘Why didn’t we 
 think about this?’ Well the answer is, 
 it didn’t occur to us that there 
 were criminals.” Eric Schmidt @RSA2017 – Chairman, Alphabet © 2017 Intertrust Technologies Corporation. All rights reserved.
  • 11. © 2017 Intertrust Technologies Corporation. All rights reserved. It’s a great time to have a job in Secure Systems Every day brings news of a new attack Consumers and infrastructure are at peril Need to understand convenience vs. security 1111
  • 12. © 2017 Intertrust Technologies Corporation. All rights reserved. 12 Overlay the Internet and operating systems with appropriate security technologies Need complete robust solutions that go way beyond strong cyphers Secure run times, properly built and deployed authentication and strong hardware and software tamper resistance
  • 13. © 2017 Intertrust Technologies Corporation. All rights reserved. Nijo-Jo: Tamper Resistance and Authentication are not new… 13 …but not everyone needs the Shogun’s interior decorator 13© 2017 Intertrust Technologies Corporation. All rights reserved.
  • 14. © 2017 Intertrust Technologies Corporation. All rights reserved. The right tool for the right job 14 People sometimes use security solutions that were too strong in certain cases — bad for business Secure systems design is a risk management exercise — if a system is too hard to use, people wont use it Understand the weaknesses and the threats, 
 then deploy appropriate technology 
 – but don’t forget that it’s all networked
  • 15. © 2017 Intertrust Technologies Corporation. All rights reserved. 15 To bring focus on threats and solutions, 
 LINE and Intertrust decided to create this conference series Today is our first summit meeting to bring experts together 
 to present research and discuss how to create 
 a safe and business friendly Internet Please enjoy!
  • 16. © 2017 Intertrust Technologies Corporation. All rights reserved. Image Attributions: • Slides 2 & 3: Terakoya for Girls / (circa 1842-45) Bungaku Bandai no Takara by Issunnshi Hanasato / Wikimedia Creative Commons (CC BY-SA 2.0) • Slides 4 & 5: The Taking of Jericho / (circa 1896-1902) by James Jacques Joseph Tissot (French, 1836-1902) / Wikimedia Creative Commons (CC BY-SA 2.0) • Slides 6: U.S. Marine Corps photo by Sgt. Devin Nichols / U.S. Government Works • Slide #7: Administrator Harry Trelogan and Agriculture Secretary Orville Freeman / (April 3, 2012) Photo courtesy of the National Archives and Records Administration / 
 Wikimedia Creative Commons (CC BY-SA 2.0) • Slide #8: Ken Thompson (sitting) & Dennis Ritchie at PDP-11 / (circa 1970) by Peter Hamer / Wikimedia Creative Commons (CC BY-SA 2.0) • Slide #10: Eric Schmidt, Executive Chairman of Google Inc., at the press conference about the e-G8 forum during the 37th G8 summit in Deauville, France / 
 (February 3, 2013) derivative work: Sven Manguard / Wikimedia Creative Commons (CC BY-SA 2.0) • Slide #12: "We Can Do It!" poster for Westinghouse / by (1942) J. Howard Miller (1918–2004) / Wikimedia Creative Commons (CC BY-SA 2.0) • Slide #13: 
 Plans of Nijō Castle / (2008) by vector image Gothika / Wikimedia Creative Commons (CC BY-SA 2.0), 
 The secret of the squeaky Nightingale Floors - nails / (May 21, 2007) by Chris Gladis / Wikimedia Creative Commons (CC BY-SA 2.0),
 Portrait of Tokugawa Ieyasu / by Kanō Tan’yū (1602–1674) / Wikimedia Creative Commons (CC BY-SA 2.0) Thank you