SlideShare uma empresa Scribd logo
1 de 12
Best Messaging, App &
Legal Practices for the
Dating Community
Neil Schwartzman,
Vice President,
Receiver & Sender Relations
Message Bus Inc.
Agenda & C.V.
Who the heck am I?
Who are you?
                     Spammer
The Issues
Messaging                   Attacks
Delivery
Email, IM, In-App, Social   DDoS, Hacks




Spoofing                    Malware
Why Comply?
+ Privacy
+ Disclosure
+ Engaged Messaging

  = Success!
Alternatively
-   User complaints
-   Deferrals
-   Blocks
-   Blacklisting
-   Poor reputation

    = Failure!
Community Best Practices



 Anti-spyware Coalition          MAAWG
      (app-related)        (Messaging Anti-abuse
                          Working Group) Senders’
                                    BP
Anti-Spyware Coalition Best
Practices
• Signing Apps
• BPs deal with:
  •   Tracking              •   System modifying
  •   Advertising display   •   Security analysis
  •   Remote control        •   Automatic download
  •   Dialing               •   Passive tracking
MAAWG Best Practices
• Infrastructure
• BPs deal with:
  •   rDNS         • Delivery Errors & List
  •   SWIP           maintenance
  •   Permission   • Blocking Remediation
  •   Disclosure
Authentication & You
• History
• Various Auth approaches:
  •   SPF             • Anti-spoofing
  •   SenderID        • New! DMARC
  •   DK
  •   DKIM
Legal
•   CANSPAM
•   COPPA
•   EU Privacy Directive
•   Canada’s Anti-Spam
    Law
Question & Answer
Discussion
Resources
www.messagebus.com/idate
•   ASC BP
•   MAAWG Senders BP (V3 out soon!)
•   MAAWG Members list
•   Rude DMARC Whitepaper {URL}
•   Message Bus / nNovation Series on CASL {URL}
•   Industry Canada CASL website
•   FTC COPPA site
•   FTC CANSPAM site
•   EU Privacy Directive Site

Mais conteúdo relacionado

Destaque

History of film the early days
History of film   the early daysHistory of film   the early days
History of film the early daysCatherine Forbes
 
Library history slideshow
Library history slideshowLibrary history slideshow
Library history slideshowSterling Lib
 
History of film the early days
History of film   the early daysHistory of film   the early days
History of film the early daysCatherine Forbes
 
Cassandra Community Webinar: CMB - An Open Message Bus for the Cloud
Cassandra Community Webinar: CMB - An Open Message Bus for the CloudCassandra Community Webinar: CMB - An Open Message Bus for the Cloud
Cassandra Community Webinar: CMB - An Open Message Bus for the CloudDataStax
 
Integration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesIntegration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesApcera
 
Where and when to use the Oracle Service Bus (OSB)
Where and when to use the Oracle Service Bus (OSB)Where and when to use the Oracle Service Bus (OSB)
Where and when to use the Oracle Service Bus (OSB)Guido Schmutz
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingVijaya Raghava Vuligundam
 
The art of assigning work
The art of assigning workThe art of assigning work
The art of assigning workJohn Hogan
 
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris Wolf
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris WolfC* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris Wolf
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris WolfDataStax Academy
 
How to Conduct UX Benchmarking
How to Conduct UX BenchmarkingHow to Conduct UX Benchmarking
How to Conduct UX BenchmarkingUserZoom
 

Destaque (13)

Ch 3
Ch 3Ch 3
Ch 3
 
Ch 1 & 2
Ch 1 & 2Ch 1 & 2
Ch 1 & 2
 
History of film the early days
History of film   the early daysHistory of film   the early days
History of film the early days
 
Library history slideshow
Library history slideshowLibrary history slideshow
Library history slideshow
 
History of film the early days
History of film   the early daysHistory of film   the early days
History of film the early days
 
Cassandra Community Webinar: CMB - An Open Message Bus for the Cloud
Cassandra Community Webinar: CMB - An Open Message Bus for the CloudCassandra Community Webinar: CMB - An Open Message Bus for the Cloud
Cassandra Community Webinar: CMB - An Open Message Bus for the Cloud
 
Integration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesIntegration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices Architectures
 
Where and when to use the Oracle Service Bus (OSB)
Where and when to use the Oracle Service Bus (OSB)Where and when to use the Oracle Service Bus (OSB)
Where and when to use the Oracle Service Bus (OSB)
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development Training
 
The art of assigning work
The art of assigning workThe art of assigning work
The art of assigning work
 
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris Wolf
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris WolfC* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris Wolf
C* Summit 2013: CMB: An Open Message Bus for the Cloud by Boris Wolf
 
Liferay Message Bus
Liferay Message BusLiferay Message Bus
Liferay Message Bus
 
How to Conduct UX Benchmarking
How to Conduct UX BenchmarkingHow to Conduct UX Benchmarking
How to Conduct UX Benchmarking
 

Semelhante a Message Bus iDate 2013 Presentation

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceJason Trost
 
R-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat IntelligenceR-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat IntelligenceJason Trost
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 
AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien ManuelDamien Manuel
 
MechanismsToDetectSMS.pptx
MechanismsToDetectSMS.pptxMechanismsToDetectSMS.pptx
MechanismsToDetectSMS.pptxtianlinghou2
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...Priyanka Aash
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuAyehu Software Technologies Ltd.
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceJason Trost
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...Plain Concepts
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsSafeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsyourDMARC
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0Tom Moore
 

Semelhante a Message Bus iDate 2013 Presentation (20)

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
R-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat IntelligenceR-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat Intelligence
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
Novinky F5 pro rok 2018
Novinky F5 pro rok 2018Novinky F5 pro rok 2018
Novinky F5 pro rok 2018
 
AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien Manuel
 
18-Spam.pptx
18-Spam.pptx18-Spam.pptx
18-Spam.pptx
 
MechanismsToDetectSMS.pptx
MechanismsToDetectSMS.pptxMechanismsToDetectSMS.pptx
MechanismsToDetectSMS.pptx
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsSafeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0
Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0
 

Message Bus iDate 2013 Presentation

  • 1. Best Messaging, App & Legal Practices for the Dating Community Neil Schwartzman, Vice President, Receiver & Sender Relations Message Bus Inc.
  • 2. Agenda & C.V. Who the heck am I? Who are you? Spammer
  • 3. The Issues Messaging Attacks Delivery Email, IM, In-App, Social DDoS, Hacks Spoofing Malware
  • 4. Why Comply? + Privacy + Disclosure + Engaged Messaging = Success!
  • 5. Alternatively - User complaints - Deferrals - Blocks - Blacklisting - Poor reputation = Failure!
  • 6. Community Best Practices Anti-spyware Coalition MAAWG (app-related) (Messaging Anti-abuse Working Group) Senders’ BP
  • 7. Anti-Spyware Coalition Best Practices • Signing Apps • BPs deal with: • Tracking • System modifying • Advertising display • Security analysis • Remote control • Automatic download • Dialing • Passive tracking
  • 8. MAAWG Best Practices • Infrastructure • BPs deal with: • rDNS • Delivery Errors & List • SWIP maintenance • Permission • Blocking Remediation • Disclosure
  • 9. Authentication & You • History • Various Auth approaches: • SPF • Anti-spoofing • SenderID • New! DMARC • DK • DKIM
  • 10. Legal • CANSPAM • COPPA • EU Privacy Directive • Canada’s Anti-Spam Law
  • 12. Resources www.messagebus.com/idate • ASC BP • MAAWG Senders BP (V3 out soon!) • MAAWG Members list • Rude DMARC Whitepaper {URL} • Message Bus / nNovation Series on CASL {URL} • Industry Canada CASL website • FTC COPPA site • FTC CANSPAM site • EU Privacy Directive Site

Notas do Editor

  1. Task Force on SpamCAUCEAnti-spyware CoalitionFCC CSRIC botnetToday – best practices and legal regimes
  2. Deliverability. Best practice + engagementAttacks – mention adobers, the year of the data breachSpoofing – steal your reputation (mention Rude whitepaper)Mention fakeGroupon app up at Microsoft
  3. ASC : America Online, Computer Associates International, Hewlett-Packard, Microsoft, and Yahoo, along with McAfee, Symantec, and Trend Micro, and anti-spyware specialist vendors and Webroot Software. examples of 200 + MAAWG members, : Apple Inc, AT&T, Comcast Message Bus, Facebook, Google, Yahoo, as well as Spamhaus, McAfee, Microsoft, Amazon, JP Morgan Chase, The U.S> Senate
  4. Application performance, important out of the gate.Published 2006 – still relevant
  5. MAAWG BPs developed by sending expertts such as Cheetahmail, Exact Target,, blacklist operators such as Spamhaus and Spamcop, end-user adovcacy groups such as CAUCE, and ultimately approved by receivers – ISPs and email box providers like Hotmail and Yahoo!
  6. SPF 2004DK DKIM 2005 SenderID 2006
  7. CASL$10MM$1MAll CEMs
  8. ASC BP http://www.antispywarecoalition.org/documents/BestPractices.htmMAAWG Senders BP http://www.maawg.org/sites/maawg/files/news/MAAWG_Senders_BCP_Ver2a-updated.pdfMAAWG Members list http://www.maawg.org/about/rosterIndustry Canada CASL website http://www.fightspam.gc.ca