SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
©2018 AppBugs, Inc. All Rights Reserved.
Building World Class Security
Products with Privacy by Design
Steve Tout
CEO
VeriClouds
@stevetout
©2018 AppBugs, Inc. All Rights Reserved.
All information contained in this presentation and all information
provided by the speaker is for informational purposes only.
Neither VeriClouds nor the speaker is an attorney and, as such,
no advice in this presentation is intended to be — or should be
considered to be — legal advice.
©2018 AppBugs, Inc. All Rights Reserved.
THE BIG IDEA
Identity theft and account takeover fraud cost consumers $21 billion in 2017.
Cyber crime damage costs to hit $6 trillion annually by 2021.
Large part of the problem is the billions of credential data sets available for sale on the dark web and online.
GOVERNMENTS ARE NOT AS SAFE AS THEY SHOULD BE. THINK OPM.
COMPANIES ARE NOT AS SAFE AS THEY COULD BE. THINK YAHOO.
TODAY’S SECURITY IS NOT SECURE. THINK EQUIFAX.
©2018 AppBugs, Inc. All Rights Reserved.
We wanted to build something
different
•We are all victims now
•It’s not enough to ask
HaveIBeenPwned?
•How at risk are my
users and is my
organization?
©2018 AppBugs, Inc. All Rights Reserved.
Credential analytics
• Collect
• Detect
• Protect
9 billion breached credentials
Toxic Waste or
Threat Intelligence?
©2018 AppBugs, Inc. All Rights Reserved.
Privacy by design
1. Proactive not Reactive; Preventative not Remedial
2. Privacy as the default setting
3. Privacy embedded into Design
4. Full Functionality – Positive-Sum, not Zero Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency
7. Respect for User Privacy – Keep it User-Centric
The 7 Foundational Principles of Privacy by Design
Dennedy, Fox, & Finneran (2014) The Privacy Engineer’s Manifesto: Getting from Policy to Code to QA to Value.
©2018 AppBugs, Inc. All Rights Reserved.
Data masking and encryption
©2018 AppBugs, Inc. All Rights Reserved.
NIST SP 800-63B
• Passwords obtained from previous breach corpuses.
• Dictionary words.
• Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’).
• Context specific words, such as the name of the service, the username,
and derivatives thereof.
Recently published NIST (National Institute of Standards and Technology) Digital Identity
Guidelines recommends a list of important verification steps when updating the password for a
given account. Specifically, that verifiers SHALL compare the prospective secret (i.e., the account
password) against a list that contains values known to be commonly-used, expected, or
compromised. For example, the list MAY include (but is not limited to):
©2018 AppBugs, Inc. All Rights Reserved.
Obtain Password
Perform Hash on Password
Modify Hashed Password
Transmit Modified Password
Search Modified Password
MATCH?
Transmit Identified Password
Provide Notification
Receive Identified Password
Compare Identified Password
to Password
MATCH?
Provide Notification
Receive Modified Password
NO
YES
YES
NO
PROVISION OF RISK INFORMATION ASSOCIATED WITH COMPROMISED ACCOUNTS
Patent Pending
Author: Rui Wang, Ph.D.
Published Date: 07/05/2018
©2018 AppBugs, Inc. All Rights Reserved.
Hardware enforced encryption
Enhances the privacy of sensitive credential data at
the design level
• hardware enforced crypto boundary with
SGX
Helps defend against internal and external attackers
• malware running on the host machine
• malicious cloud providers
• rogue employees
Credential data are totally UNUSABLE if they are
dumped
• data have been sealed/encrypted by SGX
• data can only be used on the SGX-enabled
CPU
Making stolen credentials of online accounts and blockchain identities UNUSABLE and UNHACKABLE
Hardware enforced encryption (SGX)
hosted with cloud scale economics
©2018 AppBugs, Inc. All Rights Reserved.
Is VeriClouds breaking any laws?
• Criminal intent is a necessary element of all criminal liability. Without
the requisite criminal intent, VeriClouds does not and cannot commit
any crimes.
• VeriClouds operates in the open and prides itself on transparency and
disclosure. Unlike criminal (or even dishonest) organizations, its
officers and employees each have long histories of employment and
experience in the security-research industry.
• RCW 9A.90.030(10). VeriClouds services are used “primarily to promote
security and safety.” The ability to monitor for compromised
credentials and to notify individuals when their credentials have been
leaked helps prevent additional security breaches and lowers risk.
There is unlikely to be a credible argument that VeriClouds engages in
something other than white hat security research.
©2018 AppBugs, Inc. All Rights Reserved.
Satisfying GDPR regulations
• for the performance of a contract or legal obligation;
• to protect the vital interests of the data subject;
• for a task in the public interest;
• or where processing is necessary for the legitimate interests
of the controller.
According to GDPR Article 6, personal information collection may proceed for the following purposes:
https://www.kuppingercole.com/blog/tolbert/will-your-
security-solutions-violate-gdpr
©2018 AppBugs, Inc. All Rights Reserved.
Summary
• Make privacy by design a first principle
• Be proactive, not reactive, about user privacy
• Anonymize data wherever possible
• Keep master clear stores physically separated from
production environments
• Check with vendors about what information they
collect and how it is treated
©2018 AppBugs, Inc. All Rights Reserved.
Thank you!
@stevetout
For more information visit www.vericlouds.com

Contenu connexe

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Building World Class Security Products with Privacy by Design

  • 1. ©2018 AppBugs, Inc. All Rights Reserved. Building World Class Security Products with Privacy by Design Steve Tout CEO VeriClouds @stevetout
  • 2. ©2018 AppBugs, Inc. All Rights Reserved. All information contained in this presentation and all information provided by the speaker is for informational purposes only. Neither VeriClouds nor the speaker is an attorney and, as such, no advice in this presentation is intended to be — or should be considered to be — legal advice.
  • 3. ©2018 AppBugs, Inc. All Rights Reserved. THE BIG IDEA Identity theft and account takeover fraud cost consumers $21 billion in 2017. Cyber crime damage costs to hit $6 trillion annually by 2021. Large part of the problem is the billions of credential data sets available for sale on the dark web and online. GOVERNMENTS ARE NOT AS SAFE AS THEY SHOULD BE. THINK OPM. COMPANIES ARE NOT AS SAFE AS THEY COULD BE. THINK YAHOO. TODAY’S SECURITY IS NOT SECURE. THINK EQUIFAX.
  • 4. ©2018 AppBugs, Inc. All Rights Reserved. We wanted to build something different •We are all victims now •It’s not enough to ask HaveIBeenPwned? •How at risk are my users and is my organization?
  • 5. ©2018 AppBugs, Inc. All Rights Reserved. Credential analytics • Collect • Detect • Protect 9 billion breached credentials Toxic Waste or Threat Intelligence?
  • 6. ©2018 AppBugs, Inc. All Rights Reserved. Privacy by design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the default setting 3. Privacy embedded into Design 4. Full Functionality – Positive-Sum, not Zero Sum 5. End-to-End Security – Full Lifecycle Protection 6. Visibility and Transparency 7. Respect for User Privacy – Keep it User-Centric The 7 Foundational Principles of Privacy by Design Dennedy, Fox, & Finneran (2014) The Privacy Engineer’s Manifesto: Getting from Policy to Code to QA to Value.
  • 7. ©2018 AppBugs, Inc. All Rights Reserved. Data masking and encryption
  • 8. ©2018 AppBugs, Inc. All Rights Reserved. NIST SP 800-63B • Passwords obtained from previous breach corpuses. • Dictionary words. • Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’). • Context specific words, such as the name of the service, the username, and derivatives thereof. Recently published NIST (National Institute of Standards and Technology) Digital Identity Guidelines recommends a list of important verification steps when updating the password for a given account. Specifically, that verifiers SHALL compare the prospective secret (i.e., the account password) against a list that contains values known to be commonly-used, expected, or compromised. For example, the list MAY include (but is not limited to):
  • 9. ©2018 AppBugs, Inc. All Rights Reserved. Obtain Password Perform Hash on Password Modify Hashed Password Transmit Modified Password Search Modified Password MATCH? Transmit Identified Password Provide Notification Receive Identified Password Compare Identified Password to Password MATCH? Provide Notification Receive Modified Password NO YES YES NO PROVISION OF RISK INFORMATION ASSOCIATED WITH COMPROMISED ACCOUNTS Patent Pending Author: Rui Wang, Ph.D. Published Date: 07/05/2018
  • 10. ©2018 AppBugs, Inc. All Rights Reserved. Hardware enforced encryption Enhances the privacy of sensitive credential data at the design level • hardware enforced crypto boundary with SGX Helps defend against internal and external attackers • malware running on the host machine • malicious cloud providers • rogue employees Credential data are totally UNUSABLE if they are dumped • data have been sealed/encrypted by SGX • data can only be used on the SGX-enabled CPU Making stolen credentials of online accounts and blockchain identities UNUSABLE and UNHACKABLE Hardware enforced encryption (SGX) hosted with cloud scale economics
  • 11. ©2018 AppBugs, Inc. All Rights Reserved. Is VeriClouds breaking any laws? • Criminal intent is a necessary element of all criminal liability. Without the requisite criminal intent, VeriClouds does not and cannot commit any crimes. • VeriClouds operates in the open and prides itself on transparency and disclosure. Unlike criminal (or even dishonest) organizations, its officers and employees each have long histories of employment and experience in the security-research industry. • RCW 9A.90.030(10). VeriClouds services are used “primarily to promote security and safety.” The ability to monitor for compromised credentials and to notify individuals when their credentials have been leaked helps prevent additional security breaches and lowers risk. There is unlikely to be a credible argument that VeriClouds engages in something other than white hat security research.
  • 12. ©2018 AppBugs, Inc. All Rights Reserved. Satisfying GDPR regulations • for the performance of a contract or legal obligation; • to protect the vital interests of the data subject; • for a task in the public interest; • or where processing is necessary for the legitimate interests of the controller. According to GDPR Article 6, personal information collection may proceed for the following purposes: https://www.kuppingercole.com/blog/tolbert/will-your- security-solutions-violate-gdpr
  • 13. ©2018 AppBugs, Inc. All Rights Reserved. Summary • Make privacy by design a first principle • Be proactive, not reactive, about user privacy • Anonymize data wherever possible • Keep master clear stores physically separated from production environments • Check with vendors about what information they collect and how it is treated
  • 14. ©2018 AppBugs, Inc. All Rights Reserved. Thank you! @stevetout For more information visit www.vericlouds.com