SlideShare une entreprise Scribd logo
1  sur  17
PRIVACY & SECURITY
CHALLENGES IN AN
INTERNET AGE
Vikram Kumar
Mega Ltd.
vikram@mega.co.nz
@vikram_nz

STEPPING UP / IIA NZ Conference 2013

STEPPING UP / IIA NZ Conference 2013

1
Talk scope
• Professionals and SMEs
• Online collaboration and communication (documents and
emails primarily)

• Using the open Internet
• External threats

STEPPING UP / IIA NZ Conference 2013

2
Information Integrity
Privacy +
•
•
•
•
•

Confidentiality
Integrity
Availability
Authenticity
Non-repudiation

STEPPING UP / IIA NZ Conference 2013

3
Threat Landscape
Human error +
• Non-targeted attacks
• Automated kits
• “Full take” by government agencies
• Targeted attacks
• Criminals
• Competitors or “partners” or activists
• State sponsored or initiated

STEPPING UP / IIA NZ Conference 2013

4
Major attack vectors
• Phishing, Spear Phishing
• Social engineering
• Purchase databases
• Device/Internet exploits
• Chained/escalated attacks
• Mobile and wifi
STEPPING UP / IIA NZ Conference 2013

5
Problem is increasing
• Expectations and need for anytime/anywhere access to
files
• Inability for corporate IT to deliver- the “Dropbox Effect”

• Bring Your Own Device, mobility
• Invisible, delayed impact

• Falling technology prices- especially storage

STEPPING UP / IIA NZ Conference 2013

6
CRYPTO & MEGA

STEPPING UP / IIA NZ Conference 2013

7
Crypto 101

STEPPING UP / IIA NZ Conference 2013

8
MEGA

• „Cloud‟ (Internet) file storage and collaboration
• 50 GB free storage. Fastest in the world. Easy to use.
• End-to-end, user controlled encryption
STEPPING UP / IIA NZ Conference 2013

9
MEGA Statistics
• Launched 20 January 2013
• About 5 million service users
• 450 million files uploaded, 180 Gb/s bandwidth, 0.05%
notices of alleged copyright infringement
• Hosted in Germany, Luxembourg, and NZ

• Exiting beta soon with new website, iOS app,
synchronisation client
STEPPING UP / IIA NZ Conference 2013

10
MEGA as a global company
Source: http://www.alexa.com/siteinfo/mega.co.nz

STEPPING UP / IIA NZ Conference 2013

11
Defeating crypto

STEPPING UP / IIA NZ Conference 2013

12
Crypto for the masses: lessons learnt
• It has to just work
• No compromises
• Network effect
• Privacy/confidentiality as a business model is viable
• Open source necessary for trust

STEPPING UP / IIA NZ Conference 2013

13
THE FUTURE OF EMAIL

STEPPING UP / IIA NZ Conference 2013

14
Email in a post-Snowden era
The death of email is vastly exaggerated.
3 emerging paths:
• Peer-to-peer

• Integrated with standard web email
• Closed, secure sandbox

but most individuals will stay with free-for-advertising model.

STEPPING UP / IIA NZ Conference 2013

15
MEGA’s secure communications approach
• Closed, secure model with end-to-end encryption
• Integrate with online file storage and collaboration
• Integrated messaging, voice, and video
• In the browser but other apps and services built on top of
MEGA will provide multiple options

• Privacy but not anonymity

STEPPING UP / IIA NZ Conference 2013

16
THANK YOU
Questions / comments?

STEPPING UP / IIA NZ Conference 2013

17

Contenu connexe

Tendances

Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityBen Boyd
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and YouCaroline Dunn
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Facundo Mauricio
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data ProtectionNICVA
 
Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber SecurityNICVA
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Global inventory
Global inventoryGlobal inventory
Global inventoryBob Marcus
 
2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetupxsited
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital TrendsDawn Raquel Jensen, EMBA
 
Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco
 

Tendances (20)

IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
 
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Mikie
MikieMikie
Mikie
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Global inventory
Global inventoryGlobal inventory
Global inventory
 
2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Cryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalistsCryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalists
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
 
Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018
 

En vedette

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspectivekumar641
 
Osdc 2013 p
Osdc 2013 pOsdc 2013 p
Osdc 2013 pkumar641
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101kumar641
 
Ndf2012 vikram kumar
Ndf2012 vikram kumarNdf2012 vikram kumar
Ndf2012 vikram kumarkumar641
 
Bitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldBitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldkumar641
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computingkumar641
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Thingskotahinet
 
Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)kumar641
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchainkumar641
 

En vedette (9)

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspective
 
Osdc 2013 p
Osdc 2013 pOsdc 2013 p
Osdc 2013 p
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Ndf2012 vikram kumar
Ndf2012 vikram kumarNdf2012 vikram kumar
Ndf2012 vikram kumar
 
Bitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldBitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised world
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Things
 
Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchain
 

Similaire à Stepping Up conference 2013

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]APNIC
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITYETDAofficialRegist
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 

Similaire à Stepping Up conference 2013 (20)

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
itsMERocks Pitch Deck
itsMERocks Pitch DeckitsMERocks Pitch Deck
itsMERocks Pitch Deck
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 

Dernier

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Stepping Up conference 2013

  • 1. PRIVACY & SECURITY CHALLENGES IN AN INTERNET AGE Vikram Kumar Mega Ltd. vikram@mega.co.nz @vikram_nz STEPPING UP / IIA NZ Conference 2013 STEPPING UP / IIA NZ Conference 2013 1
  • 2. Talk scope • Professionals and SMEs • Online collaboration and communication (documents and emails primarily) • Using the open Internet • External threats STEPPING UP / IIA NZ Conference 2013 2
  • 4. Threat Landscape Human error + • Non-targeted attacks • Automated kits • “Full take” by government agencies • Targeted attacks • Criminals • Competitors or “partners” or activists • State sponsored or initiated STEPPING UP / IIA NZ Conference 2013 4
  • 5. Major attack vectors • Phishing, Spear Phishing • Social engineering • Purchase databases • Device/Internet exploits • Chained/escalated attacks • Mobile and wifi STEPPING UP / IIA NZ Conference 2013 5
  • 6. Problem is increasing • Expectations and need for anytime/anywhere access to files • Inability for corporate IT to deliver- the “Dropbox Effect” • Bring Your Own Device, mobility • Invisible, delayed impact • Falling technology prices- especially storage STEPPING UP / IIA NZ Conference 2013 6
  • 7. CRYPTO & MEGA STEPPING UP / IIA NZ Conference 2013 7
  • 8. Crypto 101 STEPPING UP / IIA NZ Conference 2013 8
  • 9. MEGA • „Cloud‟ (Internet) file storage and collaboration • 50 GB free storage. Fastest in the world. Easy to use. • End-to-end, user controlled encryption STEPPING UP / IIA NZ Conference 2013 9
  • 10. MEGA Statistics • Launched 20 January 2013 • About 5 million service users • 450 million files uploaded, 180 Gb/s bandwidth, 0.05% notices of alleged copyright infringement • Hosted in Germany, Luxembourg, and NZ • Exiting beta soon with new website, iOS app, synchronisation client STEPPING UP / IIA NZ Conference 2013 10
  • 11. MEGA as a global company Source: http://www.alexa.com/siteinfo/mega.co.nz STEPPING UP / IIA NZ Conference 2013 11
  • 12. Defeating crypto STEPPING UP / IIA NZ Conference 2013 12
  • 13. Crypto for the masses: lessons learnt • It has to just work • No compromises • Network effect • Privacy/confidentiality as a business model is viable • Open source necessary for trust STEPPING UP / IIA NZ Conference 2013 13
  • 14. THE FUTURE OF EMAIL STEPPING UP / IIA NZ Conference 2013 14
  • 15. Email in a post-Snowden era The death of email is vastly exaggerated. 3 emerging paths: • Peer-to-peer • Integrated with standard web email • Closed, secure sandbox but most individuals will stay with free-for-advertising model. STEPPING UP / IIA NZ Conference 2013 15
  • 16. MEGA’s secure communications approach • Closed, secure model with end-to-end encryption • Integrate with online file storage and collaboration • Integrated messaging, voice, and video • In the browser but other apps and services built on top of MEGA will provide multiple options • Privacy but not anonymity STEPPING UP / IIA NZ Conference 2013 16
  • 17. THANK YOU Questions / comments? STEPPING UP / IIA NZ Conference 2013 17