SlideShare a Scribd company logo
Security First
Security First - Adam Baldwin
Security First - Adam Baldwin
Thanks First
Hi, I’m Adam
Hi, I’m Adam
@adam_baldwin
@liftsecurity
@nodesecurity
Hi, I’m Adam
@evilpacket
Security First - Adam Baldwin
andbang.com
andbang.com
Security First - Adam Baldwin
Security First - Adam Baldwin
Node Security Project
nodesecurity.io
Security First
We’re Fucked
Nothing is 100%
Secure.
Security First - Adam Baldwin
Security First - Adam Baldwin
Defender Attacker
Defender Attacker
Security First - Adam Baldwin
AttackerDefender
Software is Hard
Software is full of
opinions
Security First - Adam Baldwin
Mobile First
Mobile First
Content First
Mobile First
Content First
Offline First
Mobile First
Content First
Offline First
SECURITY
Software is full of
constraints
Security is one of those
Who’s responsible for
security?
Who’s responsible for
security?
You are.
Why?
Security First - Adam Baldwin
NSA Spent $25 million
on ‘software
vulnerabilities’ in 2013
Stay off the menu.
Litigation is coming.
Litigation is coming.
Enough Doom & Gloom
already!
Enough Doom & Gloom
already!
Something has to
change
Let’s build a
Security First
culture
Security First - Adam Baldwin
Why do we avoid
security?
- Ignorance
- Procrastination
- Not Exciting work
- Not Rewarded
Education
Understand Vulnerabilities
The simple stuff
still works.
Security First - Adam Baldwin
Validation / Sanitization
Cryptohttp://www.matasano.com/articles/crypto-challenges/
http://owasp.org
npm install all the things™
npm install coffeescript
so..ahhh. what else?
Process
It’s not immutable
Community
Bridge all the worlds
http://blog.andyet.com/2013/09/11/shame-and-security
security.md
Homework.
- Learn about 1 vuln
- Audit some code
- Teach a Friend
confwork?
Talk to each other about
security...
</PRESENTATION>
@adam_baldwin | @LiftSecurity

More Related Content

PPSX
Worlds 1st DIY for Emergency & Wandering Help
PPTX
PPTX
CyberCamp 2015: Low Hanging Fruit
PPTX
Cyber security Guide
PDF
Amy mania - Put Words In My Mouth - DC2711 2019
PDF
Privacy on the Series of Tubes of Things
PDF
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
Worlds 1st DIY for Emergency & Wandering Help
CyberCamp 2015: Low Hanging Fruit
Cyber security Guide
Amy mania - Put Words In My Mouth - DC2711 2019
Privacy on the Series of Tubes of Things
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
WANTED – People Committed to Solving our Information Security Language Problem

Viewers also liked (6)

PDF
Continuous Security
PDF
Nodevember 2015
PDF
Secure Node Code (workshop, O'Reilly Security)
PDF
The Art of Identifying Vulnerabilities - CascadiaFest 2015
PDF
Continuous Security - Thunderplains 2016
PDF
Node Day - Node.js Security in the Enterprise
Continuous Security
Nodevember 2015
Secure Node Code (workshop, O'Reilly Security)
The Art of Identifying Vulnerabilities - CascadiaFest 2015
Continuous Security - Thunderplains 2016
Node Day - Node.js Security in the Enterprise
Ad

Similar to Security First - Adam Baldwin (20)

DOCX
portfolio.docx
PPTX
The Difference Between Being Secure And Being Compliant
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
PPTX
10 Components of Business Cyber Security
PPTX
How to Secure America
PPTX
Information Security Awareness Session -2020
PDF
Giant bags of mostly water
PDF
Evolving threat landscape
PDF
Cyber Security
PPTX
Lkw Security Part 1_MVPs Azra & Sanjay
PPTX
Lodi Emmanuel Palle Cybersecurity and Technology Innovation.pptx
PDF
Why isn't infosec working? Did you turn it off and back on again?
PPTX
eSafety and online security within schools
PPTX
CYBER AWARENESS.pptx cyber security ppt harika
PPTX
Cyber Security: A Common Problem 2018
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PDF
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
PDF
Opsec for security researchers
PDF
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
PPT
Module1_Intro to Security and cyber challenges_Final.ppt
portfolio.docx
The Difference Between Being Secure And Being Compliant
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
10 Components of Business Cyber Security
How to Secure America
Information Security Awareness Session -2020
Giant bags of mostly water
Evolving threat landscape
Cyber Security
Lkw Security Part 1_MVPs Azra & Sanjay
Lodi Emmanuel Palle Cybersecurity and Technology Innovation.pptx
Why isn't infosec working? Did you turn it off and back on again?
eSafety and online security within schools
CYBER AWARENESS.pptx cyber security ppt harika
Cyber Security: A Common Problem 2018
WANTED – People Committed to Solving our Information Security Language Problem
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Opsec for security researchers
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
Module1_Intro to Security and cyber challenges_Final.ppt
Ad

More from Adam Baldwin (9)

PDF
Attacking open source using abandoned resources
PDF
JavaScript Supply Chain Security
PDF
Building a Threat Model & How npm Fits Into It
PDF
Hunting for malicious modules in npm - NodeSummit
PDF
Node Security Project - LXJS 2013
PDF
JSConf 2013 Builders vs Breakers
KEY
EV1LSHA - Misadventures in the land of Lua
KEY
Writing an (in)secure webapp in 3 easy steps
PDF
Pony Pwning Djangocon 2010
Attacking open source using abandoned resources
JavaScript Supply Chain Security
Building a Threat Model & How npm Fits Into It
Hunting for malicious modules in npm - NodeSummit
Node Security Project - LXJS 2013
JSConf 2013 Builders vs Breakers
EV1LSHA - Misadventures in the land of Lua
Writing an (in)secure webapp in 3 easy steps
Pony Pwning Djangocon 2010

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Architecture types and enterprise applications.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Tartificialntelligence_presentation.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
August Patch Tuesday
PPTX
Programs and apps: productivity, graphics, security and other tools
Assigned Numbers - 2025 - Bluetooth® Document
WOOl fibre morphology and structure.pdf for textiles
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Architecture types and enterprise applications.pdf
DP Operators-handbook-extract for the Mautical Institute
Final SEM Unit 1 for mit wpu at pune .pptx
cloud_computing_Infrastucture_as_cloud_p
Tartificialntelligence_presentation.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
1. Introduction to Computer Programming.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
Developing a website for English-speaking practice to English as a foreign la...
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles - August'25-Week II
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools

Security First - Adam Baldwin