Overview
Syllabus
Intro
Welcome
Who am I
Attacks are a technical problem
Existing defence measures do not match attacker tactics
Nakatomi space
Who owns cybersecurity
Four pillars of cybersecurity
Most ignored component
Bank statements
App activity statement
Two harmonious mindsets
Transparency
Maturity
Users
Zero Days
Dancing Pigs
Stupid People
User Behaviour
User Maturity
User Maturity Curve
Uninformed Users
Reward Users
Password Composition Guidelines
How many of you use WhatsApp
How do you log into WhatsApp
The big message
Banking customer suggestion
Telegram
Gmail
Take ownership of cybersecurity
Change the mindset
Questions
Political problem
Change the thought process
Look for simple things
Taught by
Hack In The Box Security Conference