Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Intro to Cybersecurity Workshop
Search
John Downey
July 24, 2017
Technology
0
120
Intro to Cybersecurity Workshop
John Downey
July 24, 2017
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
150
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
160
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
160
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
340
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
140
Cryptography Pitfalls at LASCON 2016
jtdowney
0
190
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
230
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
310
Cryptography Pitfalls at Abstractions
jtdowney
0
91
Other Decks in Technology
See All in Technology
ディスプレイ広告(Yahoo!広告・LINE広告)におけるバックエンド開発
lycorptech_jp
PRO
0
340
Windows の新しい管理者保護モード
murachiakira
0
200
Ruby on Railsで持続可能な開発を行うために取り組んでいること
am1157154
3
140
Cracking the Coding Interview 6th Edition
gdplabs
14
28k
IAMポリシーのAllow/Denyについて、改めて理解する
smt7174
2
200
EDRの検知の仕組みと検知回避について
chayakonanaika
11
4.8k
データエンジニアリング領域におけるDuckDBのユースケース
chanyou0311
9
2.1k
ESXi で仮想化した ARM 環境で LLM を動作させてみるぞ
unnowataru
0
170
Amazon Aurora のバージョンアップ手法について
smt7174
2
140
生成AI×財務経理:PoCで挑むSlack AI Bot開発と現場巻き込みのリアル
pohdccoe
1
620
実は強い 非ViTな画像認識モデル
tattaka
2
1.2k
わたしがEMとして入社した「最初の100日」の過ごし方 / EMConfJp2025
daiksy
14
4.9k
Featured
See All Featured
Navigating Team Friction
lara
183
15k
The Cult of Friendly URLs
andyhume
78
6.2k
Intergalactic Javascript Robots from Outer Space
tanoku
270
27k
The World Runs on Bad Software
bkeepers
PRO
67
11k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
330
21k
Rebuilding a faster, lazier Slack
samanthasiow
80
8.9k
Bash Introduction
62gerente
611
210k
Cheating the UX When There Is Nothing More to Optimize - PixelPioneers
stephaniewalter
280
13k
Embracing the Ebb and Flow
colly
84
4.6k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
29
1k
BBQ
matthewcrist
87
9.5k
The Power of CSS Pseudo Elements
geoffreycrofte
75
5.5k
Transcript
Intro to Cybersecurity John Downey | @jtdowney http://bit.ly/2tTOeu1 1
Intro to Cybersecurity Information Security John Downey | @jtdowney http://bit.ly/2tTOeu1
2
whoami 4 John Downey 4 Security Lead at Braintree 4
All self taught 4 No certifications http://bit.ly/2tTOeu1 3
Managing Risk Risk = Liklihood × Impact http://bit.ly/2tTOeu1 4
Likelihood http://bit.ly/2tTOeu1 5
Threat Actors 4 Skill 4 Motive 4 Opportunity 4 Organization
http://bit.ly/2tTOeu1 6
Vulnerability 4 Ease of discovery 4 Ease of exploitation 4
Awareness 4 Zero day http://bit.ly/2tTOeu1 7
Impact http://bit.ly/2tTOeu1 8
Technical Loss 4 Confidentiality 4 Integrity 4 Availability http://bit.ly/2tTOeu1 9
Damages 4 Financial 4 Reputation 4 Leadership Change http://bit.ly/2tTOeu1 10
Mitigation Approach http://bit.ly/2tTOeu1 11
Prevention 4 Segmentation 4 Access control lists 4 Training 4
Testing 4 Governance http://bit.ly/2tTOeu1 12
Detection 4 Scanning 4 Intrusion detection systems 4 File integrity
monitoring 4 Antivirus http://bit.ly/2tTOeu1 13
Response 4 Incident response plans 4 Security operations center 4
Digital forensics 4 Active mitigtaion http://bit.ly/2tTOeu1 14
Case Studies http://bit.ly/2tTOeu1 15
Denial of Service http://bit.ly/2tTOeu1 16
http://bit.ly/2tTOeu1 17
http://bit.ly/2tTOeu1 18
Tips 4 Evaluate the risk 4 Maybe have a plan
for dealing with a DDoS attack http://bit.ly/2tTOeu1 19
Password Reuse http://bit.ly/2tTOeu1 20
http://bit.ly/2tTOeu1 21
http://bit.ly/2tTOeu1 22
Tips 4 Use a password manager 4 Enable two-factor authentication
everywhere 4 Resources 4 https://haveibeenpwned.com 4 https://opensource.com/article/17/2/password- management http://bit.ly/2tTOeu1 23
Software Patching http://bit.ly/2tTOeu1 24
http://bit.ly/2tTOeu1 25
http://bit.ly/2tTOeu1 26
Tips 4 Turn on automatic updates 4 Don't dismiss or
ignore updates 4 Keep all devices up to date 4 Help out those who aren't as security savvy http://bit.ly/2tTOeu1 27
Software Bug http://bit.ly/2tTOeu1 28
http://bit.ly/2tTOeu1 29
Tips 4 OWASP - https://www.owasp.org 4 WebGoat - https://github.com/WebGoat/WebGoat 4
Hacksplaining - https://www.hacksplaining.com http://bit.ly/2tTOeu1 30
Workshop 4 Verizon Data Breach Report - http://vz.to/2qihidi 4 Hacksplaining
- https://www.hacksplaining.com 4 WebGoat - https://github.com/WebGoat/WebGoat 4 flAWS - http://flaws.cloud http://bit.ly/2tTOeu1 31
Image Credits 4 https://flic.kr/p/bov2cY 4 https://flic.kr/p/aoSXLS 4 https://flic.kr/p/npSVNU 4 https://en.wikipedia.org/wiki/Information_security
4 https://en.wikipedia.org/wiki/PAVE_PAWS http://bit.ly/2tTOeu1 32