SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Crazy incentives
and how they drive
security into
no man's land
Christian Folini
Keynote 2023
Streaming
in China
Source:
@RealSexyCyborg
(Naomi Wu)
Streaming
in China
Hello Insomni’Hack!
I am Christian Folini
Find me at @ChrFolini / @folini@infosec.exchange
Swiss Security Engineer
OWASP CRS Co-Lead
Wearer of Many Helmets
“
In general, incentives are
anything that persuade a
person to alter their
behaviour. (Wikipedia)
“
In general, incentives are anything that
persuade a person to alter their behaviour.
...
Higher incentives amount to greater levels
of effort and therefore, higher levels of
performance.
Elon scrambling
for money
“
Nessus
Reports
More Nessus
Madness
Inflated
Numbers
Even Bigger
Numbers
Source: https://techjury.net/
The Infamous
Norse
Dashboard
A Kibana Example
Typical ModSecurity Dashboard Element
Survivorship
Bias
Source: Wikipedia: Survivorship Bias
Bug Bounty Hunters
Source:
https://pexels.com
Bug Bounty
Hunters
Penetration Testers
Large
Baskets
with
Many,
Many
Eggs
Crisis
Communication
Ransomware
Source: Wikipedia: AIDS DOS Trojan 1989
Ransomware and Cyber Insurance
Commercial WAF Detection Rates
Source: https://fraktal.fi (Tuomo Makkonnen, 2020)
Unce upon a time, there was a boy ...
The boy was a shepherd
His little herd also included a ram
He took them through a forest
In the forest, there was a wolf
The boy screamed and called the hunters
The hunters came and wanted to kill the wolf
But as it turned out, it was all a false positive!
The alternative: a false negative!
The alternative: a false negative!
The alternative: a false negative!
Commercial WAF Detection Rates
Source: https://fraktal.fi (Tuomo Makkonnen, 2020)
Summary
Let’s wrap this up!
Level 1
An overly relaxed attitude,
ignorance, negligence and
carelessness lead to bad
incentives for users.
Tricking them into weak
decisions undermining
security.
Two Levels of Bad Incentives
Level 2
Deliberately following or
setting crazy incentives for
immediate gain;
consciously prioritizing
financial benefit over
security of users and their
data.
It’s your job to raise the alarm when incentives
and security don’t align!
Contact
christian.folini@netnea.com
@ChrFolini
@folini@infosec.exchange

Contenu connexe

Tendances

Java (Netbeans) - Abstract & Interface - Object Oriented Programming
Java (Netbeans) - Abstract & Interface - Object Oriented ProgrammingJava (Netbeans) - Abstract & Interface - Object Oriented Programming
Java (Netbeans) - Abstract & Interface - Object Oriented Programming
Melina Krisnawati
 

Tendances (20)

Iplementasi ISO dan OHSAS
Iplementasi ISO dan OHSASIplementasi ISO dan OHSAS
Iplementasi ISO dan OHSAS
 
Proposal Project Management Plan
Proposal Project Management PlanProposal Project Management Plan
Proposal Project Management Plan
 
04. K3 PEKERJAAN KONSTRUKSI.ppt
04. K3 PEKERJAAN KONSTRUKSI.ppt04. K3 PEKERJAAN KONSTRUKSI.ppt
04. K3 PEKERJAAN KONSTRUKSI.ppt
 
Pertemuan 5 Membangun Datawarehouse
Pertemuan 5 Membangun DatawarehousePertemuan 5 Membangun Datawarehouse
Pertemuan 5 Membangun Datawarehouse
 
Rapat Tinjauan Manajemen
Rapat Tinjauan ManajemenRapat Tinjauan Manajemen
Rapat Tinjauan Manajemen
 
System Request
System RequestSystem Request
System Request
 
1. Algoritma, Struktur Data dan Pemrograman Terstruktur
1. Algoritma, Struktur Data dan Pemrograman Terstruktur1. Algoritma, Struktur Data dan Pemrograman Terstruktur
1. Algoritma, Struktur Data dan Pemrograman Terstruktur
 
Server autentikasi
Server autentikasiServer autentikasi
Server autentikasi
 
File_Soal_17_158_29_1659598023(1).pptx
File_Soal_17_158_29_1659598023(1).pptxFile_Soal_17_158_29_1659598023(1).pptx
File_Soal_17_158_29_1659598023(1).pptx
 
T2 - Desain Basis Data
T2 - Desain Basis DataT2 - Desain Basis Data
T2 - Desain Basis Data
 
Proposal KAK Sistem Informasi Posko Keamanan
Proposal KAK Sistem Informasi Posko KeamananProposal KAK Sistem Informasi Posko Keamanan
Proposal KAK Sistem Informasi Posko Keamanan
 
jembatan
jembatanjembatan
jembatan
 
Sekilas sni iso 17065
Sekilas sni iso 17065Sekilas sni iso 17065
Sekilas sni iso 17065
 
Manajemen SDM Proyek
Manajemen SDM  ProyekManajemen SDM  Proyek
Manajemen SDM Proyek
 
Suggestion system (ss) 2016
Suggestion system (ss) 2016Suggestion system (ss) 2016
Suggestion system (ss) 2016
 
8 waste ok.ppt
8 waste ok.ppt8 waste ok.ppt
8 waste ok.ppt
 
Kedudukan hukum dan peran jabatan pppk dalam uu no 5 tahun 2014
Kedudukan hukum dan peran jabatan pppk dalam uu no 5 tahun 2014Kedudukan hukum dan peran jabatan pppk dalam uu no 5 tahun 2014
Kedudukan hukum dan peran jabatan pppk dalam uu no 5 tahun 2014
 
Java (Netbeans) - Abstract & Interface - Object Oriented Programming
Java (Netbeans) - Abstract & Interface - Object Oriented ProgrammingJava (Netbeans) - Abstract & Interface - Object Oriented Programming
Java (Netbeans) - Abstract & Interface - Object Oriented Programming
 
Integrate ManifoldCF with Solr
Integrate ManifoldCF with SolrIntegrate ManifoldCF with Solr
Integrate ManifoldCF with Solr
 
power.pptx
power.pptxpower.pptx
power.pptx
 

Similaire à Crazy incentives and how they drive security into no man's land

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 

Similaire à Crazy incentives and how they drive security into no man's land (17)

Vannevar Bush Invention Essay In 1945
Vannevar Bush Invention Essay In 1945Vannevar Bush Invention Essay In 1945
Vannevar Bush Invention Essay In 1945
 
Luxury Personalised Stationery Personal Statio
Luxury Personalised Stationery Personal StatioLuxury Personalised Stationery Personal Statio
Luxury Personalised Stationery Personal Statio
 
Persuasive Essay For Birth Control
Persuasive Essay For Birth ControlPersuasive Essay For Birth Control
Persuasive Essay For Birth Control
 
Positive side-effects of misinformation
Positive side-effects of misinformationPositive side-effects of misinformation
Positive side-effects of misinformation
 
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Can You Start An Academic Essay With A Quote
Can You Start An Academic Essay With A QuoteCan You Start An Academic Essay With A Quote
Can You Start An Academic Essay With A Quote
 
ACT Writing Prep How To Write An Argumentative Essay The Pr
ACT Writing Prep How To Write An Argumentative Essay  The PrACT Writing Prep How To Write An Argumentative Essay  The Pr
ACT Writing Prep How To Write An Argumentative Essay The Pr
 
A NSA me segue (e a CIA também!)
A NSA me segue (e a CIA também!)A NSA me segue (e a CIA também!)
A NSA me segue (e a CIA também!)
 
Enlightenment Thinkers Essay. Online assignment writing service.
Enlightenment Thinkers Essay. Online assignment writing service.Enlightenment Thinkers Essay. Online assignment writing service.
Enlightenment Thinkers Essay. Online assignment writing service.
 
Thesis Statement Examples For Poetry Essays
Thesis Statement Examples For Poetry EssaysThesis Statement Examples For Poetry Essays
Thesis Statement Examples For Poetry Essays
 
Fiction process
Fiction processFiction process
Fiction process
 
Vassilis Galanos - The Luciferian Nature of Information and the Informational...
Vassilis Galanos - The Luciferian Nature of Information and the Informational...Vassilis Galanos - The Luciferian Nature of Information and the Informational...
Vassilis Galanos - The Luciferian Nature of Information and the Informational...
 
Business School Essays That Made A Difference Hands On Learning 4 All
Business School Essays That Made A Difference Hands On Learning 4 AllBusiness School Essays That Made A Difference Hands On Learning 4 All
Business School Essays That Made A Difference Hands On Learning 4 All
 
Counterterrorism Model Effectiveness
Counterterrorism Model EffectivenessCounterterrorism Model Effectiveness
Counterterrorism Model Effectiveness
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Michael Oher Essay.pdf
Michael Oher Essay.pdfMichael Oher Essay.pdf
Michael Oher Essay.pdf
 

Plus de Christian Folini

Plus de Christian Folini (18)

OWASP ModSecurity - A few plot twists and what feels like a happy end
OWASP ModSecurity - A few plot twists and what feels like a happy endOWASP ModSecurity - A few plot twists and what feels like a happy end
OWASP ModSecurity - A few plot twists and what feels like a happy end
 
Never Walk Alone - Inspirations from a Growing OWASP Project
Never Walk Alone - Inspirations from a Growing OWASP ProjectNever Walk Alone - Inspirations from a Growing OWASP Project
Never Walk Alone - Inspirations from a Growing OWASP Project
 
What’s new in CRS4? An Update from the OWASP CRS project
What’s new in CRS4? An Update from the OWASP CRS projectWhat’s new in CRS4? An Update from the OWASP CRS project
What’s new in CRS4? An Update from the OWASP CRS project
 
The Adventurous Tale of Online Voting in Switzerland
The Adventurous Tale of Online Voting in SwitzerlandThe Adventurous Tale of Online Voting in Switzerland
The Adventurous Tale of Online Voting in Switzerland
 
EVoting in der Schweiz - Ein Fortsetzungsroman
EVoting in der Schweiz - Ein FortsetzungsromanEVoting in der Schweiz - Ein Fortsetzungsroman
EVoting in der Schweiz - Ein Fortsetzungsroman
 
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule SetSecuring Access to Internet Voting with the OWASP ModSecurity Core Rule Set
Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set
 
Extensive Introduction to ModSecurity and the OWASP Core Rule Set
Extensive Introduction to ModSecurity and the OWASP Core Rule SetExtensive Introduction to ModSecurity and the OWASP Core Rule Set
Extensive Introduction to ModSecurity and the OWASP Core Rule Set
 
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
The Adventurous Tale of Online Voting in Switzerland (Usenix Enigma 2021 conf...
 
Introduction to ModSecurity and the OWASP Core Rule Set
Introduction to ModSecurity and the OWASP Core Rule SetIntroduction to ModSecurity and the OWASP Core Rule Set
Introduction to ModSecurity and the OWASP Core Rule Set
 
Folini Extended Introduction to ModSecurity and CRS3
Folini Extended Introduction to ModSecurity and CRS3Folini Extended Introduction to ModSecurity and CRS3
Folini Extended Introduction to ModSecurity and CRS3
 
Gedanken zur elektronischen Stimmabgabe für Datenschützer
Gedanken zur elektronischen Stimmabgabe für DatenschützerGedanken zur elektronischen Stimmabgabe für Datenschützer
Gedanken zur elektronischen Stimmabgabe für Datenschützer
 
Medieval Castles and Modern Servers
Medieval Castles and Modern ServersMedieval Castles and Modern Servers
Medieval Castles and Modern Servers
 
E-Voting, die Sicherheit und die Rolle der Experten
E-Voting, die Sicherheit und die Rolle der ExpertenE-Voting, die Sicherheit und die Rolle der Experten
E-Voting, die Sicherheit und die Rolle der Experten
 
Black alps 2018-folini-d-dos
Black alps 2018-folini-d-dosBlack alps 2018-folini-d-dos
Black alps 2018-folini-d-dos
 
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX PlusOptimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX Plus
 
A General Look at the State of Security - AFCEA 2017
A General Look at the State of Security - AFCEA 2017A General Look at the State of Security - AFCEA 2017
A General Look at the State of Security - AFCEA 2017
 
Introducing the OWASP ModSecurity Core Rule Set
Introducing the OWASP ModSecurity Core Rule SetIntroducing the OWASP ModSecurity Core Rule Set
Introducing the OWASP ModSecurity Core Rule Set
 
OWASP ModSecurity Core Rules Paranoia Mode
OWASP ModSecurity Core Rules Paranoia ModeOWASP ModSecurity Core Rules Paranoia Mode
OWASP ModSecurity Core Rules Paranoia Mode
 

Dernier

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Crazy incentives and how they drive security into no man's land