SlideShare a Scribd company logo
Justin StanfordCEO, 4D Innovations Group
Who am I?26, entrepreneur and investorFounder, advisor, CEO, director, investor to various companiesFirst business at 13, selling juiceWas always interested in business and technologyLeft school to enter the business world at 17Current project: 4Di Capital
Who am I?Interested in the security space from 15Became a hackerAppeared on 3rd DegreeNoticed clear trends which led me into the security industry
Heavy Chef Session - Justin Stanford's presentation on Online Security
CompaniesFirst two startup attempts were in securityAm today involved in two:
Key Trend in my LifetimeThe technologisation of EVERYTHING
The technologisation of EVERYTHINGCommunications (E-mail, IM, VoIP, SMS)Personal & social life (Facebook, Twitter)Banking (Internet banking)Taxes (SARS E-Filing)Information (World Wide Web)Business & Shopping (E-commerce)Workplace (Remote VPN, mobile devices, video conferencing)Travel (e-Ticketing, Accomodation, Rentals)Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s)Navigation (GPS)Reading (eBooks, Kindle, Web)Writing (Word, Powerpoint, Excel)Filing (Digital storage, DMS, Dropbox)Access control (Biometrics, keypads, 2FA)
ConclusionOur entire lives are technologised and onlineSecurity is one of the singularly most important technological considerations for today and the future!Probably not a bad business to be in then…
Security IndustryInteresting thing about the security business: it’s pretty recession resilient!
Main security focus historicallyInfrastructure centric, perimeter defended networksAttackers wanted to own your COMPUTERSViruses, worms, trojans, exploitsUseful for bot nets, DDoS, sending spam, attacking other networks, stealing data, covering up hacks, trafficking in warezAttackers soon became very sophisticated, organised and financially driven
Main security focus historicallyServers & workstationsInternal apps & servicesServers & workstationsInternal apps & servicesInternet
New shiftShift away from monolithic interconnected networks with fixed perimeters to distributed devices accessing distributed services from anywhere at anytimeSecurity is now a scattered problem: You have to defend your networks, various distributed devices, various distributed services, and rely on cloud networks to do their jobHuman element now more crucial than ever
Internet
New shiftAttackers want to own your DEVICESBut even more so, attackers want to own your IDENTITYWhy?
The technologisation of EVERYTHINGCommunications (E-mail, IM, VoIP, SMS)Personal & social life (Facebook, Twitter)Banking (Internet banking)Taxes (SARS E-Filing)Information (World Wide Web)Business & Shopping (E-commerce)Workplace (Remote VPN, mobile devices, video conferencing)Travel (e-Ticketing, Accomodation, Rentals)Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s)Navigation (GPS)Reading (eBooks, Kindle, Web)Writing (Word, Powerpoint, Excel)Filing (Digital storage, DMS, Dropbox)Access control (Biometrics, keypads, 2FA)
Devices and identityCountless possible endpoint leakages: Laptops, smart phones, cloud email accounts, cloud CRM, cloud hosted files, etcIdentity allows access to EVERYTHINGScary: majority of modern day identity is protected with a username and a passwordOne of the biggest new commodities in the modern day world: TRUSTImportant for individuals, companies, brands
Heavy Chef Session - Justin Stanford's presentation on Online Security
MethodsPrimary attack & risk vectors todayE-mailPhishing e-mails, highly effective at identity theftAttachments to install malware, bots, key loggers, etcTake advantage of hot topics or play on concernsWebPhishing sites, fake sitesEmbedded malwareSearch engine / SEO attacksMan in the browser, man in the middleSocial engineeringConvince consumers or company staff, happening a lot!Loss or theft of devicesCareful what you trust! Don’t believe what you see.
More trendsApple MacsIt’s not coming, it’s here already!Smart phones and tablet devicesWe do a lot on these already!2009 saw 4 iPhone exploits in a few weeks!Compromise of one account compromising manySaving of user detailsGreater use of search engines and social media to spread malware, spam, phishing and create fake presences to capitalise on trustRogue security softwareBot net turf wars and increasingly intelligent malware
Thank you!Questions?

More Related Content

PPTX
Is your privacy, private?
PPTX
Cyberspace
PPTX
Cyberspace & Digital Divide
ODP
Digital Natives
PPTX
Empowerment Technologies Lecture 3 (Philippines SHS)
PPTX
Online Security and How to Make Money Online
PPTX
Cyberspace slide show
PDF
Center for Identity Webcast: The Internet of Things
Is your privacy, private?
Cyberspace
Cyberspace & Digital Divide
Digital Natives
Empowerment Technologies Lecture 3 (Philippines SHS)
Online Security and How to Make Money Online
Cyberspace slide show
Center for Identity Webcast: The Internet of Things

What's hot (20)

PPTX
Misuse of Internet
PDF
Infocom Security
PDF
Cyber Space Threats and Opportunities
PPTX
Cyber Space
PPT
Social media risk
PPTX
Computer Crimes
PPTX
Mobile security
PPTX
C3 and digital citizenship
PDF
SOCIAL NETWORK SECURITY
PDF
IONU For Business
PPTX
Cyber ethics cbse class xi
PPTX
Cyber crimes
PPT
Rothke Sia 2006
PPT
Cyber Crime
PDF
20130321 Cybercrime threats on e-commerce online shops
PPTX
Smartphone and mobile device safety & security
PPT
Smarter Cyber Security
PDF
Programma o sarai programmato
PDF
Cyber Security at CTX15, London
Misuse of Internet
Infocom Security
Cyber Space Threats and Opportunities
Cyber Space
Social media risk
Computer Crimes
Mobile security
C3 and digital citizenship
SOCIAL NETWORK SECURITY
IONU For Business
Cyber ethics cbse class xi
Cyber crimes
Rothke Sia 2006
Cyber Crime
20130321 Cybercrime threats on e-commerce online shops
Smartphone and mobile device safety & security
Smarter Cyber Security
Programma o sarai programmato
Cyber Security at CTX15, London
Ad

Viewers also liked (7)

PDF
Heavy Chef March: Building Great Mobisites
PPT
Youth Dynamix
PPTX
A Message To Starbucks
PDF
HTML5 security
PDF
What can creativity do?
PDF
DYNAMIX GROUP SLIDESHARE 2016
PDF
Tibet 5.0 / CouchDB
Heavy Chef March: Building Great Mobisites
Youth Dynamix
A Message To Starbucks
HTML5 security
What can creativity do?
DYNAMIX GROUP SLIDESHARE 2016
Tibet 5.0 / CouchDB
Ad

Similar to Heavy Chef Session - Justin Stanford's presentation on Online Security (20)

PPT
Bright talk intrusion prevention are we joking - henshaw july 2010 a
PDF
E security and payment 2013-1
PDF
Most Important Data Security Concerns Troubling Enterprises
PPT
It security &_ethical_hacking
PDF
Cyber modified
PPTX
Crimes in digital marketing..pptx
DOCX
Team 3_Final Project.docx
PDF
Hacking 04 2011
PDF
Cyber security notes or Mca/bca about security
PPSX
Cyber security & Data Protection
PDF
Tackling the cyber security threat (2016 - v1.0)
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PPTX
Cyber Security Professionals in Demand
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
5 network-security-threats
PDF
It’s time to boost VoIP network security
PPTX
Cyber security
PPT
Shailendra Pandey.ppt
Bright talk intrusion prevention are we joking - henshaw july 2010 a
E security and payment 2013-1
Most Important Data Security Concerns Troubling Enterprises
It security &_ethical_hacking
Cyber modified
Crimes in digital marketing..pptx
Team 3_Final Project.docx
Hacking 04 2011
Cyber security notes or Mca/bca about security
Cyber security & Data Protection
Tackling the cyber security threat (2016 - v1.0)
First Lecture- Cyber Security-Bangladesh.pptx
Principles of Information Security 6th Edition Whitman Solutions Manual
Cyber Security Professionals in Demand
Five Network Security Threats And How To Protect Your Business Wp101112
5 network-security-threats
It’s time to boost VoIP network security
Cyber security
Shailendra Pandey.ppt

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hybrid model detection and classification of lung cancer
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A comparative study of natural language inference in Swahili using monolingua...
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Web App vs Mobile App What Should You Build First.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A novel scalable deep ensemble learning framework for big data classification...
observCloud-Native Containerability and monitoring.pptx
WOOl fibre morphology and structure.pdf for textiles
Assigned Numbers - 2025 - Bluetooth® Document
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hybrid model detection and classification of lung cancer
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
Final SEM Unit 1 for mit wpu at pune .pptx
Hindi spoken digit analysis for native and non-native speakers

Heavy Chef Session - Justin Stanford's presentation on Online Security

  • 1. Justin StanfordCEO, 4D Innovations Group
  • 2. Who am I?26, entrepreneur and investorFounder, advisor, CEO, director, investor to various companiesFirst business at 13, selling juiceWas always interested in business and technologyLeft school to enter the business world at 17Current project: 4Di Capital
  • 3. Who am I?Interested in the security space from 15Became a hackerAppeared on 3rd DegreeNoticed clear trends which led me into the security industry
  • 5. CompaniesFirst two startup attempts were in securityAm today involved in two:
  • 6. Key Trend in my LifetimeThe technologisation of EVERYTHING
  • 7. The technologisation of EVERYTHINGCommunications (E-mail, IM, VoIP, SMS)Personal & social life (Facebook, Twitter)Banking (Internet banking)Taxes (SARS E-Filing)Information (World Wide Web)Business & Shopping (E-commerce)Workplace (Remote VPN, mobile devices, video conferencing)Travel (e-Ticketing, Accomodation, Rentals)Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s)Navigation (GPS)Reading (eBooks, Kindle, Web)Writing (Word, Powerpoint, Excel)Filing (Digital storage, DMS, Dropbox)Access control (Biometrics, keypads, 2FA)
  • 8. ConclusionOur entire lives are technologised and onlineSecurity is one of the singularly most important technological considerations for today and the future!Probably not a bad business to be in then…
  • 9. Security IndustryInteresting thing about the security business: it’s pretty recession resilient!
  • 10. Main security focus historicallyInfrastructure centric, perimeter defended networksAttackers wanted to own your COMPUTERSViruses, worms, trojans, exploitsUseful for bot nets, DDoS, sending spam, attacking other networks, stealing data, covering up hacks, trafficking in warezAttackers soon became very sophisticated, organised and financially driven
  • 11. Main security focus historicallyServers & workstationsInternal apps & servicesServers & workstationsInternal apps & servicesInternet
  • 12. New shiftShift away from monolithic interconnected networks with fixed perimeters to distributed devices accessing distributed services from anywhere at anytimeSecurity is now a scattered problem: You have to defend your networks, various distributed devices, various distributed services, and rely on cloud networks to do their jobHuman element now more crucial than ever
  • 14. New shiftAttackers want to own your DEVICESBut even more so, attackers want to own your IDENTITYWhy?
  • 15. The technologisation of EVERYTHINGCommunications (E-mail, IM, VoIP, SMS)Personal & social life (Facebook, Twitter)Banking (Internet banking)Taxes (SARS E-Filing)Information (World Wide Web)Business & Shopping (E-commerce)Workplace (Remote VPN, mobile devices, video conferencing)Travel (e-Ticketing, Accomodation, Rentals)Entertainment (YouTube, Flickr, Online gaming, Virtual worlds, iTunes, MP3s)Navigation (GPS)Reading (eBooks, Kindle, Web)Writing (Word, Powerpoint, Excel)Filing (Digital storage, DMS, Dropbox)Access control (Biometrics, keypads, 2FA)
  • 16. Devices and identityCountless possible endpoint leakages: Laptops, smart phones, cloud email accounts, cloud CRM, cloud hosted files, etcIdentity allows access to EVERYTHINGScary: majority of modern day identity is protected with a username and a passwordOne of the biggest new commodities in the modern day world: TRUSTImportant for individuals, companies, brands
  • 18. MethodsPrimary attack & risk vectors todayE-mailPhishing e-mails, highly effective at identity theftAttachments to install malware, bots, key loggers, etcTake advantage of hot topics or play on concernsWebPhishing sites, fake sitesEmbedded malwareSearch engine / SEO attacksMan in the browser, man in the middleSocial engineeringConvince consumers or company staff, happening a lot!Loss or theft of devicesCareful what you trust! Don’t believe what you see.
  • 19. More trendsApple MacsIt’s not coming, it’s here already!Smart phones and tablet devicesWe do a lot on these already!2009 saw 4 iPhone exploits in a few weeks!Compromise of one account compromising manySaving of user detailsGreater use of search engines and social media to spread malware, spam, phishing and create fake presences to capitalise on trustRogue security softwareBot net turf wars and increasingly intelligent malware