Surviving Your Next Data Breach

Surviving Your Next Data Breach

It happens even to tech giants: they get hacked and client databases get leaked. Let's look at what data is the most sensitive and what steps we can take to protect it, while still keeping all of the user experience intact. Come see why most web applications do passwords and credit card information wrong.

B3b2139e4f2c0eca4efe2379fcebc1c5?s=128

Anna Filina

March 09, 2017
Tweet

Transcript

  1. 3.

    It Happens • Dropbox • Adobe • LinkedIn • Yahoo!

    68 million 152 million 164 million 1.2 billion
  2. 7.
  3. 9.

    Sensitive Data • Passwords • Credit cards • Social security

    numbers • Current locations • IP addresses • ...
  4. 10.

    Getting Ready for the Breach • Store less • Make

    stolen data useless • Post-breach procedures
  5. 14.
  6. 17.
  7. 18.
  8. 22.

    Please charge half on 
 4111 1111 1111 1111 


    (06/17) and the other half on
 4012 8888 8888 1881
 (10/19)
  9. 25.

    How do They Work? • Create string permutations • Compute

    hashes • Steal password hashes • Look up in table
  10. 27.
  11. 28.

    Response Plan • Log out. • Mark as compromised. •

    Force 2nd factor auth. • Force password change. • Mark as not compromised.