Explore the evolving landscape of network security in this 51-minute conference talk from BSides San Francisco 2015. Delve into the shift from traditional security models to modern approaches, examining the challenges posed by the disappearance of the network perimeter. Learn about the importance of monitoring, the role of wireless devices, and the risks associated with malicious devices. Discover the significance of using passphrases instead of passwords and understand the implications of data exfiltration. Gain insights into the concept of "rooting" and how it impacts security measures. Understand why traditional security boundaries are becoming obsolete and how organizations are adapting to protect their assets in an increasingly interconnected world.
Overview
Syllabus
Intro
Review
Network Security
Traditional Security
What is being monitored
What about you
Everything else
Malicious devices
Password vs passphrase
Wireless devices
No perimeter
We dont care
Data exfiltration
Rooting