SlideShare a Scribd company logo
1 of 19
Download to read offline
© 2013 Colt Technology Services Group Limited. All rights reserved. 
2014 La sécurité chez un Service Provider en 2014 Nicolas Fischbach Director Strategy, Architecture and Innovation 
@niCRO 
securite.org/nico
2 
2 
Colt – The Information Delivery Platform 
•47,000km EU Fibre network / 37,000 transatlantic 
•23 countries / 42 metros / 192 connected cities 
•20 Colt owned data centres / 20,000 connected buildings 
•500+ NNIs / customers in 79 countries 
•MEF / ONF / NFV Member
3 
3 
Topics 
Internet Traffic 
Denial 
of Service 
SIEM 
27001 
IAM 
SP
4 
4 
Topics (cont’d) 
BGP DNS 
Data 
Locality 
DR/LI/CF 
Virtualization 
SP
5 
5 
Internet 
Traffic 
http
6 
6 
Internet 
Traffic 
https 
322%
7 
7 
Internet 
Traffic 
others 
long tail
8 
8 
Denial 
of Service 
size++ amplified
9 
9 
Denial 
of Service
10 
10 
Denial 
of Service 
high:+50% 
noise: +++
11 
11 
SIEM 
scale 
MSSP
12 
12 
SIEM
13 
13 
27001 
IAM 
mandatory 
telnet
14 
14 
27001 
IAM
15 
15 
BGP 
DNS 
status attacks
16 
16 
DR/LI/CF 
general 
update
17 
17 
Data 
Locality 
cloud 
in transit/ 
at rest
18 
18 
Virtualization 
SDN/NFV Compute
© 2014 Colt Technology Services Group Limited. All rights reserved. 
Thank you. Questions ? 
nico@colt.net // nico@securite.org // @niCRO

More Related Content

What's hot

MUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystFajar Nugroho
 
Creating a firewall in UBUNTU
Creating a firewall in UBUNTUCreating a firewall in UBUNTU
Creating a firewall in UBUNTUMumbai University
 
Jio practical training
Jio  practical training Jio  practical training
Jio practical training Rasid Khan
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
WebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonWebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonAlan Quayle
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolJose Saldana
 
ILNPv6: enabling new functionality in IPv6 applications
ILNPv6: enabling new functionality in IPv6 applicationsILNPv6: enabling new functionality in IPv6 applications
ILNPv6: enabling new functionality in IPv6 applicationsJisc
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
 
MUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyFajar Nugroho
 
Encrypt what? - A lightning talk
Encrypt what? - A lightning talkEncrypt what? - A lightning talk
Encrypt what? - A lightning talkJisc
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)Martin Schütte
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6Martin Schütte
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementationMohibullah Saail
 
NetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsNetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsMartin Schütte
 

What's hot (20)

MUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration Analyst
 
Creating a firewall in UBUNTU
Creating a firewall in UBUNTUCreating a firewall in UBUNTU
Creating a firewall in UBUNTU
 
Jio practical training
Jio  practical training Jio  practical training
Jio practical training
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Sensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWANSensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWAN
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
WebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonWebRTC Standards from Tim Panton
WebRTC Standards from Tim Panton
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocol
 
ILNPv6: enabling new functionality in IPv6 applications
ILNPv6: enabling new functionality in IPv6 applicationsILNPv6: enabling new functionality in IPv6 applications
ILNPv6: enabling new functionality in IPv6 applications
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 
MUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case Study
 
10 Good Reasons to use PROFINET
10 Good Reasons to use PROFINET10 Good Reasons to use PROFINET
10 Good Reasons to use PROFINET
 
Encrypt what? - A lightning talk
Encrypt what? - A lightning talkEncrypt what? - A lightning talk
Encrypt what? - A lightning talk
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
 
4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
NetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsNetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog Protocols
 

Viewers also liked

company profil dan Dokumen CV 1116
company profil dan Dokumen CV 1116company profil dan Dokumen CV 1116
company profil dan Dokumen CV 1116Ilman Haliman
 
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
2014 11-06-sonarqube-asfws-141110031042-conversion-gate012014 11-06-sonarqube-asfws-141110031042-conversion-gate01
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01Cyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)Barrel Software
 
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Cyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 

Viewers also liked (20)

company profil dan Dokumen CV 1116
company profil dan Dokumen CV 1116company profil dan Dokumen CV 1116
company profil dan Dokumen CV 1116
 
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
2014 11-06-sonarqube-asfws-141110031042-conversion-gate012014 11-06-sonarqube-asfws-141110031042-conversion-gate01
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
 
20141104 appsec surveillance
20141104 appsec surveillance20141104 appsec surveillance
20141104 appsec surveillance
 
20141105 asfws-norx-slides
20141105 asfws-norx-slides20141105 asfws-norx-slides
20141105 asfws-norx-slides
 
2014.11 asfws
2014.11 asfws2014.11 asfws
2014.11 asfws
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Appsecforum2014 nov14-bk-cryptool-rump
Appsecforum2014 nov14-bk-cryptool-rumpAppsecforum2014 nov14-bk-cryptool-rump
Appsecforum2014 nov14-bk-cryptool-rump
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)
Session Fixation, Reflected XSS and Store XSS Attack (Code Examples)
 
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
20141106 asfws unicode_hacks
20141106 asfws unicode_hacks20141106 asfws unicode_hacks
20141106 asfws unicode_hacks
 

Similar to Colt sp sec2014_appsec-nf-vfinal

Cisco vnp workshop 16-17 april v1-0
Cisco  vnp workshop 16-17 april v1-0Cisco  vnp workshop 16-17 april v1-0
Cisco vnp workshop 16-17 april v1-0liemgpc2
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep DiveAlan Percy
 
WiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsWiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsCisco Canada
 
Dmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppDmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppjakreile
 
PTCL Corporate product portfolio
PTCL Corporate product portfolioPTCL Corporate product portfolio
PTCL Corporate product portfolioMohammad Farooq
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Thierry Lestable
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)Thierry Lestable
 
Cnam2015 m2 m -iot - course 2 - warming - v(0.2)
Cnam2015   m2 m -iot - course 2 - warming - v(0.2)Cnam2015   m2 m -iot - course 2 - warming - v(0.2)
Cnam2015 m2 m -iot - course 2 - warming - v(0.2)Thierry Lestable
 
3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.xNguynTy5
 
ZTE Embracing the 5 g future and dramatic opportunities
ZTE Embracing the 5 g future and dramatic opportunitiesZTE Embracing the 5 g future and dramatic opportunities
ZTE Embracing the 5 g future and dramatic opportunitiesMyles Freedman
 
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformationCisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformationNetworkCollaborators
 
Ribbon ntta switching evolution
Ribbon ntta switching evolutionRibbon ntta switching evolution
Ribbon ntta switching evolutiondborsan
 
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)Dialogic Inc.
 
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...NetworkCollaborators
 
Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. E-COMMERCE MX 2015
 
3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isamNguynTy5
 

Similar to Colt sp sec2014_appsec-nf-vfinal (20)

Cisco vnp workshop 16-17 april v1-0
Cisco  vnp workshop 16-17 april v1-0Cisco  vnp workshop 16-17 april v1-0
Cisco vnp workshop 16-17 april v1-0
 
Vo ip overview
Vo ip overviewVo ip overview
Vo ip overview
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
WiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsWiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload Deployments
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Dmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppDmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility pp
 
PTCL Corporate product portfolio
PTCL Corporate product portfolioPTCL Corporate product portfolio
PTCL Corporate product portfolio
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 3 - v(0.7)
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Cnam2015 m2 m -iot - course 2 - warming - v(0.2)
Cnam2015   m2 m -iot - course 2 - warming - v(0.2)Cnam2015   m2 m -iot - course 2 - warming - v(0.2)
Cnam2015 m2 m -iot - course 2 - warming - v(0.2)
 
3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x
 
ZTE Embracing the 5 g future and dramatic opportunities
ZTE Embracing the 5 g future and dramatic opportunitiesZTE Embracing the 5 g future and dramatic opportunities
ZTE Embracing the 5 g future and dramatic opportunities
 
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformationCisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
 
Ribbon ntta switching evolution
Ribbon ntta switching evolutionRibbon ntta switching evolution
Ribbon ntta switching evolution
 
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)
Monetizing the 4G Investment (Mobile Data, and VoLTE Roaming and Interworking)
 
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...
Cisco Connect 2018 Thailand - Innovation towards sp transformation mr.sean wa...
 
Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino.
 
3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam
 
Craft2.ppt
Craft2.pptCraft2.ppt
Craft2.ppt
 

More from Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itCyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsCyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptCyber Security Alliance
 

More from Cyber Security Alliance (12)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Appsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machookAppsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machook
 
Appsec obfuscator reloaded
Appsec obfuscator reloadedAppsec obfuscator reloaded
Appsec obfuscator reloaded
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Colt sp sec2014_appsec-nf-vfinal

  • 1. © 2013 Colt Technology Services Group Limited. All rights reserved. 2014 La sécurité chez un Service Provider en 2014 Nicolas Fischbach Director Strategy, Architecture and Innovation @niCRO securite.org/nico
  • 2. 2 2 Colt – The Information Delivery Platform •47,000km EU Fibre network / 37,000 transatlantic •23 countries / 42 metros / 192 connected cities •20 Colt owned data centres / 20,000 connected buildings •500+ NNIs / customers in 79 countries •MEF / ONF / NFV Member
  • 3. 3 3 Topics Internet Traffic Denial of Service SIEM 27001 IAM SP
  • 4. 4 4 Topics (cont’d) BGP DNS Data Locality DR/LI/CF Virtualization SP
  • 5. 5 5 Internet Traffic http
  • 6. 6 6 Internet Traffic https 322%
  • 7. 7 7 Internet Traffic others long tail
  • 8. 8 8 Denial of Service size++ amplified
  • 9. 9 9 Denial of Service
  • 10. 10 10 Denial of Service high:+50% noise: +++
  • 11. 11 11 SIEM scale MSSP
  • 13. 13 13 27001 IAM mandatory telnet
  • 14. 14 14 27001 IAM
  • 15. 15 15 BGP DNS status attacks
  • 16. 16 16 DR/LI/CF general update
  • 17. 17 17 Data Locality cloud in transit/ at rest
  • 18. 18 18 Virtualization SDN/NFV Compute
  • 19. © 2014 Colt Technology Services Group Limited. All rights reserved. Thank you. Questions ? nico@colt.net // nico@securite.org // @niCRO