SlideShare uma empresa Scribd logo
1 de 17
PRIVACY & SECURITY
CHALLENGES IN AN
INTERNET AGE
Vikram Kumar
Mega Ltd.
vikram@mega.co.nz
@vikram_nz

STEPPING UP / IIA NZ Conference 2013

STEPPING UP / IIA NZ Conference 2013

1
Talk scope
• Professionals and SMEs
• Online collaboration and communication (documents and
emails primarily)

• Using the open Internet
• External threats

STEPPING UP / IIA NZ Conference 2013

2
Information Integrity
Privacy +
•
•
•
•
•

Confidentiality
Integrity
Availability
Authenticity
Non-repudiation

STEPPING UP / IIA NZ Conference 2013

3
Threat Landscape
Human error +
• Non-targeted attacks
• Automated kits
• “Full take” by government agencies
• Targeted attacks
• Criminals
• Competitors or “partners” or activists
• State sponsored or initiated

STEPPING UP / IIA NZ Conference 2013

4
Major attack vectors
• Phishing, Spear Phishing
• Social engineering
• Purchase databases
• Device/Internet exploits
• Chained/escalated attacks
• Mobile and wifi
STEPPING UP / IIA NZ Conference 2013

5
Problem is increasing
• Expectations and need for anytime/anywhere access to
files
• Inability for corporate IT to deliver- the “Dropbox Effect”

• Bring Your Own Device, mobility
• Invisible, delayed impact

• Falling technology prices- especially storage

STEPPING UP / IIA NZ Conference 2013

6
CRYPTO & MEGA

STEPPING UP / IIA NZ Conference 2013

7
Crypto 101

STEPPING UP / IIA NZ Conference 2013

8
MEGA

• „Cloud‟ (Internet) file storage and collaboration
• 50 GB free storage. Fastest in the world. Easy to use.
• End-to-end, user controlled encryption
STEPPING UP / IIA NZ Conference 2013

9
MEGA Statistics
• Launched 20 January 2013
• About 5 million service users
• 450 million files uploaded, 180 Gb/s bandwidth, 0.05%
notices of alleged copyright infringement
• Hosted in Germany, Luxembourg, and NZ

• Exiting beta soon with new website, iOS app,
synchronisation client
STEPPING UP / IIA NZ Conference 2013

10
MEGA as a global company
Source: http://www.alexa.com/siteinfo/mega.co.nz

STEPPING UP / IIA NZ Conference 2013

11
Defeating crypto

STEPPING UP / IIA NZ Conference 2013

12
Crypto for the masses: lessons learnt
• It has to just work
• No compromises
• Network effect
• Privacy/confidentiality as a business model is viable
• Open source necessary for trust

STEPPING UP / IIA NZ Conference 2013

13
THE FUTURE OF EMAIL

STEPPING UP / IIA NZ Conference 2013

14
Email in a post-Snowden era
The death of email is vastly exaggerated.
3 emerging paths:
• Peer-to-peer

• Integrated with standard web email
• Closed, secure sandbox

but most individuals will stay with free-for-advertising model.

STEPPING UP / IIA NZ Conference 2013

15
MEGA’s secure communications approach
• Closed, secure model with end-to-end encryption
• Integrate with online file storage and collaboration
• Integrated messaging, voice, and video
• In the browser but other apps and services built on top of
MEGA will provide multiple options

• Privacy but not anonymity

STEPPING UP / IIA NZ Conference 2013

16
THANK YOU
Questions / comments?

STEPPING UP / IIA NZ Conference 2013

17

Mais conteúdo relacionado

Mais procurados

Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityBen Boyd
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and YouCaroline Dunn
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Facundo Mauricio
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data ProtectionNICVA
 
Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber SecurityNICVA
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Global inventory
Global inventoryGlobal inventory
Global inventoryBob Marcus
 
2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetupxsited
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital TrendsDawn Raquel Jensen, EMBA
 
Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco
 

Mais procurados (20)

IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
 
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Mikie
MikieMikie
Mikie
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are Prot-On - Keep control of your files wherever they are
Prot-On - Keep control of your files wherever they are
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Global inventory
Global inventoryGlobal inventory
Global inventory
 
2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup2017 07 Seattle Full Stack Meetup
2017 07 Seattle Full Stack Meetup
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Cryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalistsCryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalists
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
 
Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018Appsecco Sanity Check Baseline Cyber Audit 2018
Appsecco Sanity Check Baseline Cyber Audit 2018
 

Destaque

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspectivekumar641
 
Osdc 2013 p
Osdc 2013 pOsdc 2013 p
Osdc 2013 pkumar641
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101kumar641
 
Ndf2012 vikram kumar
Ndf2012 vikram kumarNdf2012 vikram kumar
Ndf2012 vikram kumarkumar641
 
Bitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldBitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldkumar641
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computingkumar641
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Thingskotahinet
 
Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)kumar641
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchainkumar641
 

Destaque (9)

Online Privacy: A Customer's Perspective
Online Privacy: A Customer's PerspectiveOnline Privacy: A Customer's Perspective
Online Privacy: A Customer's Perspective
 
Osdc 2013 p
Osdc 2013 pOsdc 2013 p
Osdc 2013 p
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Ndf2012 vikram kumar
Ndf2012 vikram kumarNdf2012 vikram kumar
Ndf2012 vikram kumar
 
Bitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldBitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised world
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Things
 
Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchain
 

Semelhante a Stepping Up conference 2013

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]APNIC
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITYETDAofficialRegist
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 

Semelhante a Stepping Up conference 2013 (20)

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]Encryption by Default BoF by Gihan Dias [APRICOT 2015]
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
itsMERocks Pitch Deck
itsMERocks Pitch DeckitsMERocks Pitch Deck
itsMERocks Pitch Deck
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Stepping Up conference 2013

  • 1. PRIVACY & SECURITY CHALLENGES IN AN INTERNET AGE Vikram Kumar Mega Ltd. vikram@mega.co.nz @vikram_nz STEPPING UP / IIA NZ Conference 2013 STEPPING UP / IIA NZ Conference 2013 1
  • 2. Talk scope • Professionals and SMEs • Online collaboration and communication (documents and emails primarily) • Using the open Internet • External threats STEPPING UP / IIA NZ Conference 2013 2
  • 4. Threat Landscape Human error + • Non-targeted attacks • Automated kits • “Full take” by government agencies • Targeted attacks • Criminals • Competitors or “partners” or activists • State sponsored or initiated STEPPING UP / IIA NZ Conference 2013 4
  • 5. Major attack vectors • Phishing, Spear Phishing • Social engineering • Purchase databases • Device/Internet exploits • Chained/escalated attacks • Mobile and wifi STEPPING UP / IIA NZ Conference 2013 5
  • 6. Problem is increasing • Expectations and need for anytime/anywhere access to files • Inability for corporate IT to deliver- the “Dropbox Effect” • Bring Your Own Device, mobility • Invisible, delayed impact • Falling technology prices- especially storage STEPPING UP / IIA NZ Conference 2013 6
  • 7. CRYPTO & MEGA STEPPING UP / IIA NZ Conference 2013 7
  • 8. Crypto 101 STEPPING UP / IIA NZ Conference 2013 8
  • 9. MEGA • „Cloud‟ (Internet) file storage and collaboration • 50 GB free storage. Fastest in the world. Easy to use. • End-to-end, user controlled encryption STEPPING UP / IIA NZ Conference 2013 9
  • 10. MEGA Statistics • Launched 20 January 2013 • About 5 million service users • 450 million files uploaded, 180 Gb/s bandwidth, 0.05% notices of alleged copyright infringement • Hosted in Germany, Luxembourg, and NZ • Exiting beta soon with new website, iOS app, synchronisation client STEPPING UP / IIA NZ Conference 2013 10
  • 11. MEGA as a global company Source: http://www.alexa.com/siteinfo/mega.co.nz STEPPING UP / IIA NZ Conference 2013 11
  • 12. Defeating crypto STEPPING UP / IIA NZ Conference 2013 12
  • 13. Crypto for the masses: lessons learnt • It has to just work • No compromises • Network effect • Privacy/confidentiality as a business model is viable • Open source necessary for trust STEPPING UP / IIA NZ Conference 2013 13
  • 14. THE FUTURE OF EMAIL STEPPING UP / IIA NZ Conference 2013 14
  • 15. Email in a post-Snowden era The death of email is vastly exaggerated. 3 emerging paths: • Peer-to-peer • Integrated with standard web email • Closed, secure sandbox but most individuals will stay with free-for-advertising model. STEPPING UP / IIA NZ Conference 2013 15
  • 16. MEGA’s secure communications approach • Closed, secure model with end-to-end encryption • Integrate with online file storage and collaboration • Integrated messaging, voice, and video • In the browser but other apps and services built on top of MEGA will provide multiple options • Privacy but not anonymity STEPPING UP / IIA NZ Conference 2013 16
  • 17. THANK YOU Questions / comments? STEPPING UP / IIA NZ Conference 2013 17