SlideShare a Scribd company logo
1 of 20
Justin Stanford CEO, 4D Innovations Group
Who am I? 26, entrepreneur and investor Founder, advisor, CEO, director, investor to various companies First business at 13, selling juice Was always interested in business and technology Left school to enter the business world at 17 Current project: 4Di Capital
Who am I? Interested in the security space from 15 Became a hacker Appeared on 3rd Degree Noticed clear trends which led me into the security industry
Companies First two startup attempts were in security Am today involved in two:
Key Trend in my Lifetime The technologisation of EVERYTHING
The technologisation of EVERYTHING Communications (E-mail, IM, VoIP, SMS) Personal & social life (Facebook, Twitter) Banking (Internet banking) Taxes (SARS E-Filing) Information (World Wide Web) Business & Shopping (E-commerce) Workplace (Remote VPN, mobile devices, video conferencing) Travel (e-Ticketing, Accomodation, Rentals) Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s) Navigation (GPS) Reading (eBooks, Kindle, Web) Writing (Word, Powerpoint, Excel) Filing (Digital storage, DMS, Dropbox) Access control (Biometrics, keypads, 2FA)
Conclusion Our entire lives are technologised and online Security is one of the singularly most important technological considerations for today and the future! Probably not a bad business to be in then…
Security Industry Interesting thing about the security business: it’s pretty recession resilient!
Main security focus historically Infrastructure centric, perimeter defended networks Attackers wanted to own your COMPUTERS Viruses, worms, trojans, exploits Useful for bot nets, DDoS, sending spam, attacking other networks, stealing data, covering up hacks, trafficking in warez Attackers soon became very sophisticated, organised and financially driven
Main security focus historically Servers & workstations Internal apps & services Servers & workstations Internal apps & services Internet
New shift Shift away from monolithic interconnected networks with fixed perimeters to distributed devices accessing distributed services from anywhere at anytime Security is now a scattered problem: You have to defend your networks, various distributed devices, various distributed services, and rely on cloud networks to do their job Human element now more crucial than ever
Internet
New shift Attackers want to own your DEVICES But even more so, attackers want to own your IDENTITY Why?
The technologisation of EVERYTHING Communications (E-mail, IM, VoIP, SMS) Personal & social life (Facebook, Twitter) Banking (Internet banking) Taxes (SARS E-Filing) Information (World Wide Web) Business & Shopping (E-commerce) Workplace (Remote VPN, mobile devices, video conferencing) Travel (e-Ticketing, Accomodation, Rentals) Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s) Navigation (GPS) Reading (eBooks, Kindle, Web) Writing (Word, Powerpoint, Excel) Filing (Digital storage, DMS, Dropbox) Access control (Biometrics, keypads, 2FA)
Devices and identity Countless possible endpoint leakages: Laptops, smart phones, cloud email accounts, cloud CRM, cloud hosted files, etc Identity allows access to EVERYTHING Scary: majority of modern day identity is protected with a username and a password One of the biggest new commodities in the modern day world: TRUST Important for individuals, companies, brands
Methods Primary attack & risk vectors today E-mail Phishing e-mails, highly effective at identity theft Attachments to install malware, bots, key loggers, etc Take advantage of hot topics or play on concerns Web Phishing sites, fake sites Embedded malware Search engine / SEO attacks Man in the browser, man in the middle Social engineering Convince consumers or company staff, happening a lot! Loss or theft of devices Careful what you trust! Don’t believe what you see.
More trends Apple Macs It’s not coming, it’s here already! Smart phones and tablet devices We do a lot on these already! 2009 saw 4 iPhone exploits in a few weeks! Compromise of one account compromising many Saving of user details Greater use of search engines and social media to spread malware, spam, phishing and create fake presences to capitalise on trust Rogue security software Bot net turf wars and increasingly intelligent malware
Thank you! Questions?

More Related Content

What's hot

IONU For Business
IONU For BusinessIONU For Business
IONU For Business
Tim Beres
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 

What's hot (20)

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Mobile security
Mobile securityMobile security
Mobile security
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
IONU For Business
IONU For BusinessIONU For Business
IONU For Business
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 

Viewers also liked (7)

Heavy Chef March: Building Great Mobisites
Heavy Chef March: Building Great MobisitesHeavy Chef March: Building Great Mobisites
Heavy Chef March: Building Great Mobisites
 
Youth Dynamix
Youth DynamixYouth Dynamix
Youth Dynamix
 
A Message To Starbucks
A Message To StarbucksA Message To Starbucks
A Message To Starbucks
 
HTML5 security
HTML5 securityHTML5 security
HTML5 security
 
What can creativity do?
What can creativity do?What can creativity do?
What can creativity do?
 
DYNAMIX GROUP SLIDESHARE 2016
DYNAMIX GROUP SLIDESHARE 2016DYNAMIX GROUP SLIDESHARE 2016
DYNAMIX GROUP SLIDESHARE 2016
 
Tibet 5.0 / CouchDB
Tibet 5.0 / CouchDBTibet 5.0 / CouchDB
Tibet 5.0 / CouchDB
 

Similar to Heavy Chef Session - Justin Stanford's presentation on Online Security

Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 

Similar to Heavy Chef Session - Justin Stanford's presentation on Online Security (20)

Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Heavy Chef Session - Justin Stanford's presentation on Online Security

  • 1. Justin Stanford CEO, 4D Innovations Group
  • 2. Who am I? 26, entrepreneur and investor Founder, advisor, CEO, director, investor to various companies First business at 13, selling juice Was always interested in business and technology Left school to enter the business world at 17 Current project: 4Di Capital
  • 3. Who am I? Interested in the security space from 15 Became a hacker Appeared on 3rd Degree Noticed clear trends which led me into the security industry
  • 4.
  • 5. Companies First two startup attempts were in security Am today involved in two:
  • 6. Key Trend in my Lifetime The technologisation of EVERYTHING
  • 7. The technologisation of EVERYTHING Communications (E-mail, IM, VoIP, SMS) Personal & social life (Facebook, Twitter) Banking (Internet banking) Taxes (SARS E-Filing) Information (World Wide Web) Business & Shopping (E-commerce) Workplace (Remote VPN, mobile devices, video conferencing) Travel (e-Ticketing, Accomodation, Rentals) Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s) Navigation (GPS) Reading (eBooks, Kindle, Web) Writing (Word, Powerpoint, Excel) Filing (Digital storage, DMS, Dropbox) Access control (Biometrics, keypads, 2FA)
  • 8. Conclusion Our entire lives are technologised and online Security is one of the singularly most important technological considerations for today and the future! Probably not a bad business to be in then…
  • 9. Security Industry Interesting thing about the security business: it’s pretty recession resilient!
  • 10. Main security focus historically Infrastructure centric, perimeter defended networks Attackers wanted to own your COMPUTERS Viruses, worms, trojans, exploits Useful for bot nets, DDoS, sending spam, attacking other networks, stealing data, covering up hacks, trafficking in warez Attackers soon became very sophisticated, organised and financially driven
  • 11. Main security focus historically Servers & workstations Internal apps & services Servers & workstations Internal apps & services Internet
  • 12. New shift Shift away from monolithic interconnected networks with fixed perimeters to distributed devices accessing distributed services from anywhere at anytime Security is now a scattered problem: You have to defend your networks, various distributed devices, various distributed services, and rely on cloud networks to do their job Human element now more crucial than ever
  • 14. New shift Attackers want to own your DEVICES But even more so, attackers want to own your IDENTITY Why?
  • 15. The technologisation of EVERYTHING Communications (E-mail, IM, VoIP, SMS) Personal & social life (Facebook, Twitter) Banking (Internet banking) Taxes (SARS E-Filing) Information (World Wide Web) Business & Shopping (E-commerce) Workplace (Remote VPN, mobile devices, video conferencing) Travel (e-Ticketing, Accomodation, Rentals) Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s) Navigation (GPS) Reading (eBooks, Kindle, Web) Writing (Word, Powerpoint, Excel) Filing (Digital storage, DMS, Dropbox) Access control (Biometrics, keypads, 2FA)
  • 16. Devices and identity Countless possible endpoint leakages: Laptops, smart phones, cloud email accounts, cloud CRM, cloud hosted files, etc Identity allows access to EVERYTHING Scary: majority of modern day identity is protected with a username and a password One of the biggest new commodities in the modern day world: TRUST Important for individuals, companies, brands
  • 17.
  • 18. Methods Primary attack & risk vectors today E-mail Phishing e-mails, highly effective at identity theft Attachments to install malware, bots, key loggers, etc Take advantage of hot topics or play on concerns Web Phishing sites, fake sites Embedded malware Search engine / SEO attacks Man in the browser, man in the middle Social engineering Convince consumers or company staff, happening a lot! Loss or theft of devices Careful what you trust! Don’t believe what you see.
  • 19. More trends Apple Macs It’s not coming, it’s here already! Smart phones and tablet devices We do a lot on these already! 2009 saw 4 iPhone exploits in a few weeks! Compromise of one account compromising many Saving of user details Greater use of search engines and social media to spread malware, spam, phishing and create fake presences to capitalise on trust Rogue security software Bot net turf wars and increasingly intelligent malware