Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Kelsey Gilmore-Innis - Seriously Strong Securit...
Search
PyCon 2016
June 01, 2016
Programming
6
930
Kelsey Gilmore-Innis - Seriously Strong Security on a Shoestring
PyCon 2016
June 01, 2016
Tweet
Share
More Decks by PyCon 2016
See All by PyCon 2016
Manuel Ebert - Putting 1 million new words into the dictionary
pycon2016
6
920
Brett Slatkin - Refactoring Python: Why and how to restructure your code
pycon2016
17
5.6k
Mike Graham - The Life Cycle of a Python Class
pycon2016
7
8.8k
Nathaniel Manista, Augie Fackler - Code Unto Others
pycon2016
0
510
Alex Gaynor - The cobbler's children have no shoes, or building better tools for ourselves
pycon2016
0
770
Adrienne Lowe - Bake the Cookies, Wear the Dress: Connecting with Confident Authenticity
pycon2016
0
350
Jake Vanderplas - Statistics for Hackers
pycon2016
17
4.9k
Daniele Procida - Documentation-driven development - lessons from the Django Project
pycon2016
3
850
Shannon Quinn - Python for Public Health: Building Statistical Models of Ciliary Motion
pycon2016
0
540
Other Decks in Programming
See All in Programming
「Cursor/Devin全社導入の理想と現実」のその後
saitoryc
0
820
チームで開発し事業を加速するための"良い"設計の考え方 @ サポーターズCoLab 2025-07-08
agatan
1
420
High-Level Programming Languages in AI Era -Human Thought and Mind-
hayat01sh1da
PRO
0
770
git worktree × Claude Code × MCP ~生成AI時代の並列開発フロー~
hisuzuya
1
570
#QiitaBash MCPのセキュリティ
ryosukedtomita
1
1.3k
なぜ適用するか、移行して理解するClean Architecture 〜構造を超えて設計を継承する〜 / Why Apply, Migrate and Understand Clean Architecture - Inherit Design Beyond Structure
seike460
PRO
3
770
A full stack side project webapp all in Kotlin (KotlinConf 2025)
dankim
0
120
スタートアップの急成長を支えるプラットフォームエンジニアリングと組織戦略
sutochin26
1
5.6k
レベル1の開発生産性向上に取り組む − 日々の作業の効率化・自動化を通じた改善活動
kesoji
0
200
PHP 8.4の新機能「プロパティフック」から学ぶオブジェクト指向設計とリスコフの置換原則
kentaroutakeda
2
900
おやつのお供はお決まりですか?@WWDC25 Recap -Japan-\(region).swift
shingangan
0
140
イベントストーミング図からコードへの変換手順 / Procedure for Converting Event Storming Diagrams to Code
nrslib
2
810
Featured
See All Featured
The Myth of the Modular Monolith - Day 2 Keynote - Rails World 2024
eileencodes
26
2.9k
The Success of Rails: Ensuring Growth for the Next 100 Years
eileencodes
45
7.5k
実際に使うSQLの書き方 徹底解説 / pgcon21j-tutorial
soudai
PRO
181
54k
Large-scale JavaScript Application Architecture
addyosmani
512
110k
Improving Core Web Vitals using Speculation Rules API
sergeychernyshev
18
970
Building a Modern Day E-commerce SEO Strategy
aleyda
42
7.4k
RailsConf 2023
tenderlove
30
1.1k
Fantastic passwords and where to find them - at NoRuKo
philnash
51
3.3k
Optimizing for Happiness
mojombo
379
70k
Facilitating Awesome Meetings
lara
54
6.4k
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
8
820
The Invisible Side of Design
smashingmag
301
51k
Transcript
SERIOUSLY STRONG SECURITY ON A SHOESTRING content warning: sexual assault
SERIOUSLY STRONG SECURITY ON A SHOESTRING Kelsey Gilmore-Innis @_K_E_L_S_E_Y nerd.kelseyinnis.com
Callisto www.projectcallisto.org
IT DOESN’T TAKE AN ARMY
YOU CAN’T SECURE DATA ON THE INTERNET
YOU CAN SECURE DATA ON THE INTERNET
START FROM SOLID FOUNDATIONS
KNOW YOUR STRENGTHS
KNOW YOUR STRENGTHS •CLOUD HOSTING •PLATFORM AS A SERVICE •CONTENT
DISTRIBUTION NETWORKS
KNOW YOUR THREATS
SECURITY REQUIRES EMPATHY
YOUR BIGGEST THREAT IS IN THIS ROOM
YOUR SECOND BIGGEST THREAT IS WHO YOU’RE TRYING TO PROTECT
TELL ME YOUR CAT’S NAME AND I CAN ACCESS YOUR
WHOLE WORLD • ZXCVBN • CMU’s USABLE PRIVACY & SECURITY LAB • RATE LIMITING
“COMPUTER” CAN MEAN MANY THINGS
BOUNDARIES ARE HARD
DON’T GET CUTE
BE LAZY BUT NOT COMPLACENT
PAY SOMEONE SMARTER
THANKS! www.projectcallisto.org nerd.kelseyinnis.com