Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Kelsey Gilmore-Innis - Seriously Strong Securit...
Search
PyCon 2016
June 01, 2016
Programming
6
930
Kelsey Gilmore-Innis - Seriously Strong Security on a Shoestring
PyCon 2016
June 01, 2016
Tweet
Share
More Decks by PyCon 2016
See All by PyCon 2016
Manuel Ebert - Putting 1 million new words into the dictionary
pycon2016
6
920
Brett Slatkin - Refactoring Python: Why and how to restructure your code
pycon2016
17
5.6k
Mike Graham - The Life Cycle of a Python Class
pycon2016
7
8.8k
Nathaniel Manista, Augie Fackler - Code Unto Others
pycon2016
0
510
Alex Gaynor - The cobbler's children have no shoes, or building better tools for ourselves
pycon2016
0
770
Adrienne Lowe - Bake the Cookies, Wear the Dress: Connecting with Confident Authenticity
pycon2016
0
350
Jake Vanderplas - Statistics for Hackers
pycon2016
17
4.9k
Daniele Procida - Documentation-driven development - lessons from the Django Project
pycon2016
3
850
Shannon Quinn - Python for Public Health: Building Statistical Models of Ciliary Motion
pycon2016
0
540
Other Decks in Programming
See All in Programming
AIプログラマーDevinは PHPerの夢を見るか?
shinyasaita
1
220
AIともっと楽するE2Eテスト
myohei
6
2.6k
ruby.wasmで多人数リアルタイム通信ゲームを作ろう
lnit
3
470
Railsアプリケーションと パフォーマンスチューニング ー 秒間5万リクエストの モバイルオーダーシステムを支える事例 ー Rubyセミナー 大阪
falcon8823
5
1.1k
地方に住むエンジニアの残酷な現実とキャリア論
ichimichi
5
1.5k
Startups on Rails in Past, Present and Future–Irina Nazarova, RailsConf 2025
irinanazarova
0
100
Result型で“失敗”を型にするPHPコードの書き方
kajitack
5
650
なぜ「共通化」を考え、失敗を繰り返すのか
rinchoku
1
650
Azure AI Foundryではじめてのマルチエージェントワークフロー
seosoft
0
170
Hypervel - A Coroutine Framework for Laravel Artisans
albertcht
1
120
Team operations that are not burdened by SRE
kazatohiei
1
310
効率的な開発手段として VRTを活用する
ishkawa
0
140
Featured
See All Featured
Building an army of robots
kneath
306
45k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
229
22k
The Illustrated Children's Guide to Kubernetes
chrisshort
48
50k
Gamification - CAS2011
davidbonilla
81
5.4k
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
8
820
Building Applications with DynamoDB
mza
95
6.5k
Exploring the Power of Turbo Streams & Action Cable | RailsConf2023
kevinliebholz
34
5.9k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
50
5.5k
What’s in a name? Adding method to the madness
productmarketing
PRO
23
3.5k
Bash Introduction
62gerente
613
210k
Stop Working from a Prison Cell
hatefulcrawdad
271
21k
Writing Fast Ruby
sferik
628
62k
Transcript
SERIOUSLY STRONG SECURITY ON A SHOESTRING content warning: sexual assault
SERIOUSLY STRONG SECURITY ON A SHOESTRING Kelsey Gilmore-Innis @_K_E_L_S_E_Y nerd.kelseyinnis.com
Callisto www.projectcallisto.org
IT DOESN’T TAKE AN ARMY
YOU CAN’T SECURE DATA ON THE INTERNET
YOU CAN SECURE DATA ON THE INTERNET
START FROM SOLID FOUNDATIONS
KNOW YOUR STRENGTHS
KNOW YOUR STRENGTHS •CLOUD HOSTING •PLATFORM AS A SERVICE •CONTENT
DISTRIBUTION NETWORKS
KNOW YOUR THREATS
SECURITY REQUIRES EMPATHY
YOUR BIGGEST THREAT IS IN THIS ROOM
YOUR SECOND BIGGEST THREAT IS WHO YOU’RE TRYING TO PROTECT
TELL ME YOUR CAT’S NAME AND I CAN ACCESS YOUR
WHOLE WORLD • ZXCVBN • CMU’s USABLE PRIVACY & SECURITY LAB • RATE LIMITING
“COMPUTER” CAN MEAN MANY THINGS
BOUNDARIES ARE HARD
DON’T GET CUTE
BE LAZY BUT NOT COMPLACENT
PAY SOMEONE SMARTER
THANKS! www.projectcallisto.org nerd.kelseyinnis.com