Page 1
Keren Elazari aka @K3r3n3
Page 18
Source : “25 Years Of Vulnerabilities: 1988-2012 Sourcefire Research Report”
Page 21
Solution: Secure What Matters!
Page 22
Life Rights CritInfr IP PII CCN
Counter- measures
Situational Awareness
Operational Excellence
Defensible Infrastructure
REPLACEABILITY
Original Model by Joshua Corman
Page 23
https://www.iamthecavalry.org/
Page 26
Solution: Don’t Keep Your Bugs To Yourself
Page 28
https://bugcrowd.com/list-of-bug-bounty-programs
Page 29
The Internet Bug Bounty
https://hackerone.com/ibb
Page 37
Solution: Stop, Collaborate and Share
Page 41
Image by Chris Halderman CC BY 3.0
Page 42
Solution : Empower The Masses
Image by Scoobay CC BY-NC-SA 2.0
Page 48
Image: Crobis, The Economist
Page 55
Secure What Matters
Don’t Keep Your Bugs To Yourself
Collaborate & Share
Empower The Masses
Stop The Spread Of FUD
Page 56
Bonus Points: One Million
Security Professionals
Needed!
Source : Cisco 2014 Annual Security Report