when's enough, enough (oct 2015) slideshare 2

31
We are pleased to present a new show in cyber security, entitled . . . Enough, “When’s Enough?”

Upload: elizabeth-martin

Post on 15-Apr-2017

81 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: When's enough, enough (oct 2015) slideshare   2

We are pleased to present a new show in cyber

security, entitled . . .

Enough, “When’s

Enough?”

Page 2: When's enough, enough (oct 2015) slideshare   2

All is well at Int’l Phishing Industries. . .

Int’l Phishing Industries

Page 3: When's enough, enough (oct 2015) slideshare   2

I’ve got

the OPM

on the hook!

Oh good, another one!Great!

The same

tricks keep

working. . .

Int’l Phishing Industries

OPM

All is well at Int’l Phishing Industries. . .

Page 4: When's enough, enough (oct 2015) slideshare   2

Was the OPM Breach really a surprise???

Breaking

NewsCardSystems

2005

TD Ameritrade

2015

Breaking News

2007Breaking

News

2011Breaking

News

2013

Breaking

News

2014

Breaking News

Home Depot, DHS

Anthem

RSA

Target

Page 5: When's enough, enough (oct 2015) slideshare   2

Was the OPM Breach really a surprise???

Breaking

NewsCardSystems

2005

TD Ameritrade

2015

Breaking News

2007Breaking

News

2011Breaking

News

2013

Breaking

News

2014

Breaking News

Home Depot, DHS

Anthem

RSA

Target

It was the SAME type of attack as Anthem.

Which was the SAME as Home Depot. . .

and DHS. . . and Target.

And Phishing Attacks go UNDETECTED for years–

like Pawn Storm 2007-2014

Of course not. . .

Page 6: When's enough, enough (oct 2015) slideshare   2

If you think it ain’t broke, the Government’s$4.5 billion

Einstein System failed

to protect

Page 7: When's enough, enough (oct 2015) slideshare   2

over 5 MILLION

Fingerprints also stolen from the

OPM

If you think it ain’t broke, the Government’s$4.5 billion

Einstein System failed

to protect

Page 8: When's enough, enough (oct 2015) slideshare   2

More BYOD, social media & apps make it even easier for me.

And it’s getting worse. . .

Page 9: When's enough, enough (oct 2015) slideshare   2

More BYOD, social media & apps make it even easier for me.

They’re now specifically targeting

containers and virtualization too!

And it’s getting worse. . .

Page 10: When's enough, enough (oct 2015) slideshare   2

Here’s a thought. .

.

Page 11: When's enough, enough (oct 2015) slideshare   2

INTRODUCING

Let’s try something

DIFFERENT!

Page 12: When's enough, enough (oct 2015) slideshare   2

Hardware-Separated Operating Systems

Willy & Wally WorkPlay

Starring

Let’s try something

DIFFERENT!

Page 13: When's enough, enough (oct 2015) slideshare   2

Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 14: When's enough, enough (oct 2015) slideshare   2

I’ve got MY OWN kernel,

storage, RAM & drivers.

Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 15: When's enough, enough (oct 2015) slideshare   2

I’ve got MY OWN kernel,

storage, RAM & drivers.

I’ve got MY OWN kernel,

storage, RAM & drivers,

TOO!Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 16: When's enough, enough (oct 2015) slideshare   2

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 17: When's enough, enough (oct 2015) slideshare   2

W

W

WW

W

Wally can’t touch me!

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 18: When's enough, enough (oct 2015) slideshare   2

W

W

WW

W

P

P

PP

P

Wally can’t touch me! And Willy

can’t touch me!

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 19: When's enough, enough (oct 2015) slideshare   2

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 20: When's enough, enough (oct 2015) slideshare   2

Boys! Learn to

share. Share your

kernel . . . Share

your memory . . .

Share ALL of your

resources.

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 21: When's enough, enough (oct 2015) slideshare   2

Boys! Learn to

share. Share your

kernel . . . Share

your memory . . .

Share ALL of your

resources.

NO Mom, sharing is NOT GOOD.

When one of us gets a virus, do you want the other one

infected too?

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 22: When's enough, enough (oct 2015) slideshare   2

Now Wally’s boss doesn’t have to worry

about what Willy is doing.

Page 23: When's enough, enough (oct 2015) slideshare   2

BYOD just became a

lot easier . . .

Now Wally’s boss doesn’t have to worry

about what Willy is doing.

IT Admi

n

Page 24: When's enough, enough (oct 2015) slideshare   2

Here Willy and Wally go to work

for the Government. . .

Page 25: When's enough, enough (oct 2015) slideshare   2

Here Willy and Wally go to work

for the Government. . . I’m doing

CLASSIFIED only

Page 26: When's enough, enough (oct 2015) slideshare   2

Here Willy and Wally go to work

for the Government. . . I’m doing

EVERYTHING else

I’m doing CLASSIFIED

only

Page 27: When's enough, enough (oct 2015) slideshare   2

Going Out

of

Business

Sale

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 28: When's enough, enough (oct 2015) slideshare   2

I hacked in

but can’t

access t

he

network

Going Out

of

Business

Sale

DRAT!

FOILED AGAIN

by Hardware-

Separated

Operating Systems!

Any luck?

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 29: When's enough, enough (oct 2015) slideshare   2

Anybody wanna buy my laptop?

I hacked in

but can’t

access t

he

network

Going Out

of

Business

Sale

Will you take this

stupid suit they

made me wear in

this cartoon play?

DRAT!

FOILED AGAIN

by Hardware-

Separated

Operating Systems!

Any luck?

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 30: When's enough, enough (oct 2015) slideshare   2

Before you go, did you know?

Page 31: When's enough, enough (oct 2015) slideshare   2

Before you go, did you know?

*Author’s note: Willy and Wally are fictional characters who accurately portray WorkPlay Technology. Otherwise, any resemblance to persons living or dead is coincidental.

IT Admi

n

Willy & Wally* are less than 10K lines of

code.