drawing the line correctly: enough security, everywhere

16
© 2017 Intertrust Technologies Corporation. All rights reserved. Drawing the Line Correctly: Enough Security, Everywhere LINE-Intertrust Security Summit 1 —Tokyo May 17, 2017 Talal G. Shamoon, CEO Intertrust

Upload: line-corporation

Post on 17-Mar-2018

3.516 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

Drawing the Line Correctly: Enough Security, EverywhereLINE-Intertrust Security Summit 1 —TokyoMay 17, 2017

Talal G. Shamoon, CEO Intertrust

Page 2: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

Welcome to the first LINE-Intertrust Security Summit

2© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 3: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

LINE-Intertrust Security Summit• Meeting of the minds on modern

Internet secure systems

• Bring together business, research and products

• Open dialog to discuss challenges and solutions that the market faces

3© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 4: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

The Internet was never designed with inherent security in mind

Basic (huge) Problem

4© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 5: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

Because the bad guyswere assumed to be on the outside

The Internet was never designed with inherent security in mind

5

Basic Problem

© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 6: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

The security model was to “shoot the bad guys” when they came close to the computer

6© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 7: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

The Internet was originally designed for military and government communication to be, resilient, robust and distributed

7© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 8: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

1965-1975:

Multics — a “modern” operating system for the new age …lots of cool security concepts for its day

Multics failed. And the Bell Labs team who worked on it wrote Unix — with little security…

8© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 9: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved. 9

http:// ++ +

= Security Circus

Fast forward: a few things happened…

Page 10: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved. 10

“We now find ourselves back fixing [the Internet] over and over again…”“You keep saying, ‘Why didn’t we think about this?’ Well the answer is, it didn’t occur to us that there were criminals.”

Eric Schmidt @RSA2017 – Chairman, Alphabet

© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 11: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

It’s a great time to have a job in Secure Systems

Every day brings news of a new attack

Consumers and infrastructure are at peril

Need to understand convenience vs. security

1111

Page 12: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved. 12

Overlay the Internet and operating systems with appropriate security technologies

Need complete robust solutions that go way beyond strong cyphers

Secure run times, properly built and deployed authentication and strong hardware and software tamper resistance

Page 13: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

Nijo-Jo: Tamper Resistance and Authentication are not new…

13

…but not everyone needs the Shogun’s interior decorator

13© 2017 Intertrust Technologies Corporation. All rights reserved.

Page 14: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

The right tool for the right job

14

People sometimes use security solutions that were too strong in certain cases — bad for business

Secure systems design is a risk management exercise — if a system is too hard to use, people wont use it

Understand the weaknesses and the threats, then deploy appropriate technology – but don’t forget that it’s all networked

Page 15: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved. 15

To bring focus on threats and solutions, LINE and Intertrust decided to create this conference series

Today is our first summit meeting to bring experts together to present research and discuss how to create

a safe and business friendly Internet

Please enjoy!

Page 16: Drawing the Line Correctly:   Enough Security, Everywhere

© 2017 Intertrust Technologies Corporation. All rights reserved.

Image Attributions:

• Slides 2 & 3: Terakoya for Girls / (circa 1842-45) Bungaku Bandai no Takara by Issunnshi Hanasato / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slides 4 & 5: The Taking of Jericho / (circa 1896-1902) by James Jacques Joseph Tissot (French, 1836-1902) / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slides 6: U.S. Marine Corps photo by Sgt. Devin Nichols / U.S. Government Works

• Slide #7: Administrator Harry Trelogan and Agriculture Secretary Orville Freeman / (April 3, 2012) Photo courtesy of the National Archives and Records Administration / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #8: Ken Thompson (sitting) & Dennis Ritchie at PDP-11 / (circa 1970) by Peter Hamer / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #10: Eric Schmidt, Executive Chairman of Google Inc., at the press conference about the e-G8 forum during the 37th G8 summit in Deauville, France / (February 3, 2013) derivative work: Sven Manguard / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #12: "We Can Do It!" poster for Westinghouse / by (1942) J. Howard Miller (1918–2004) / Wikimedia Creative Commons (CC BY-SA 2.0)

• Slide #13: Plans of Nijō Castle / (2008) by vector image Gothika / Wikimedia Creative Commons (CC BY-SA 2.0), The secret of the squeaky Nightingale Floors - nails / (May 21, 2007) by Chris Gladis / Wikimedia Creative Commons (CC BY-SA 2.0),Portrait of Tokugawa Ieyasu / by Kanō Tan’yū (1602–1674) / Wikimedia Creative Commons (CC BY-SA 2.0)

Thank you