71
The great debate: Security vs. Privacy David Strom @dstrom ISACA keynote October, 2016

Security v. Privacy: the great debate

Embed Size (px)

Citation preview

Page 1: Security v. Privacy: the great debate

The great debate: Security vs. Privacy

David Strom@dstrom

ISACA keynoteOctober, 2016

Page 2: Security v. Privacy: the great debate

Here is the choice:

Page 3: Security v. Privacy: the great debate
Page 4: Security v. Privacy: the great debate

Agenda

• Notable privacy failures • Suggested solutions• Scary things from today’s current events• Some key takeaways

Page 5: Security v. Privacy: the great debate

Notable failures

Page 6: Security v. Privacy: the great debate
Page 7: Security v. Privacy: the great debate

This isn’t news

Page 8: Security v. Privacy: the great debate
Page 9: Security v. Privacy: the great debate
Page 10: Security v. Privacy: the great debate

10

How to get arrestedfor your tweets andpay thousands infines

http://strominator.com

Page 11: Security v. Privacy: the great debate

http://strominator.com 11

3/11, he Tweeted 10 jokes making fun of the Japanese after the tsunami – AFLAC fired him as their rep

Page 12: Security v. Privacy: the great debate
Page 13: Security v. Privacy: the great debate
Page 14: Security v. Privacy: the great debate
Page 15: Security v. Privacy: the great debate
Page 16: Security v. Privacy: the great debate
Page 17: Security v. Privacy: the great debate
Page 18: Security v. Privacy: the great debate
Page 19: Security v. Privacy: the great debate
Page 20: Security v. Privacy: the great debate
Page 21: Security v. Privacy: the great debate

Speaking of vans…

Page 22: Security v. Privacy: the great debate
Page 23: Security v. Privacy: the great debate
Page 24: Security v. Privacy: the great debate

Suggested solutions

• Privacy by design• Can you protect your most sensitive data?• Anonymous vs. private information• Understanding privacy policies of Google et al.

Page 25: Security v. Privacy: the great debate
Page 26: Security v. Privacy: the great debate

PbyD: 7 point plan

• Be proactive• Do it by default• It is a win-win• Include from the start• End-to-end security very important• Let the sun shine in• Keep it user-centric

Page 27: Security v. Privacy: the great debate
Page 28: Security v. Privacy: the great debate
Page 29: Security v. Privacy: the great debate
Page 30: Security v. Privacy: the great debate
Page 31: Security v. Privacy: the great debate
Page 32: Security v. Privacy: the great debate

Privacy vs. anonymity

Page 33: Security v. Privacy: the great debate
Page 34: Security v. Privacy: the great debate
Page 35: Security v. Privacy: the great debate
Page 36: Security v. Privacy: the great debate
Page 37: Security v. Privacy: the great debate
Page 38: Security v. Privacy: the great debate
Page 39: Security v. Privacy: the great debate
Page 40: Security v. Privacy: the great debate
Page 41: Security v. Privacy: the great debate

Just some of the conditionsWe retain the personal information you provide while your account is in

existence or as needed to provide you services. We may retain your personal information even after you have closed your account if retention is reasonably necessary to comply with our legal obligations, meet regulatory requirements, resolve disputes between Members, prevent fraud and abuse, or enforce this Privacy Policy and our User Agreement. We may retain personal information, for a limited period of time, if requested by law enforcement. We may also disclose your personal information to a third party as part of a sale of the assets of LinkedIn Corporation, a subsidiary, or division, or as the result of a change in control of the company or one of its affiliates, or in preparation for any of these events. Any third party to which we transfers or sells our assets will have the right to continue to use the personal and other information that you provide to us in the manner set out in this Privacy Policy.

Page 42: Security v. Privacy: the great debate
Page 43: Security v. Privacy: the great debate
Page 44: Security v. Privacy: the great debate
Page 45: Security v. Privacy: the great debate
Page 46: Security v. Privacy: the great debate
Page 47: Security v. Privacy: the great debate
Page 48: Security v. Privacy: the great debate
Page 49: Security v. Privacy: the great debate
Page 50: Security v. Privacy: the great debate
Page 51: Security v. Privacy: the great debate
Page 52: Security v. Privacy: the great debate
Page 53: Security v. Privacy: the great debate
Page 54: Security v. Privacy: the great debate
Page 55: Security v. Privacy: the great debate
Page 56: Security v. Privacy: the great debate
Page 57: Security v. Privacy: the great debate
Page 58: Security v. Privacy: the great debate

Scary things about security and privacy

from the present day

Page 59: Security v. Privacy: the great debate
Page 60: Security v. Privacy: the great debate

Mother Horrified to Learn Hackers Put Live Feed of Daughters' Bedroom Online

Page 61: Security v. Privacy: the great debate
Page 62: Security v. Privacy: the great debate

Progressive Insurance’s Snapshot Device

What we use to calculate your Snapshot result:• Hard braking• Amount of time driven• Time and day• Fast or jackrabbit starts• Trip regularity

Page 63: Security v. Privacy: the great debate
Page 64: Security v. Privacy: the great debate
Page 65: Security v. Privacy: the great debate

Vs.

Page 66: Security v. Privacy: the great debate
Page 67: Security v. Privacy: the great debate
Page 68: Security v. Privacy: the great debate
Page 69: Security v. Privacy: the great debate
Page 70: Security v. Privacy: the great debate
Page 71: Security v. Privacy: the great debate

http://strominator.com 71

Good luck and stay safe!

David Strom(314) [email protected]: @dstromhttp://strominator.comSlides available:http://slideshare.net/davidstrom