SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Modern Cloud Data Security Practices
The World of Interconnected Devices
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
A tale of a hackathon, voice
payments, and the security
through requests not to steal.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Case Study: Fixing that
massive security hole
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Serverless framework provides the
compute and data management from
stored data location to machine learning
engine.
Machine learning system provides the
data enhancement capabilities which
improves the underlying source data’s
metadata (information about information).
7
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Case Study: Enhancing Video
Indexing Data
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data
Data store &
initial metadata
Serverless Framework
Callback handler and code
execution
Machine Learning
Data processor and
enhancer
Webhook
Metadata
Execute
Callback
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
// JSON payload for a sample video file
{
"status": "active",
"author": "Jonathan LeBlanc",
"currentState": "staging",
"type": "video-content-d086c908-2498-4d3e-8a1f-01e82bfc2abe",
"parent": "folder_94784195",
"id": "46586c534-21e1-619r-bera-521a0573914e",
"version": 1,
"typeVersion": 1,
"scope": "enterprise_5425632”
}
Normal File Payload
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
// JSON payload for a sample video file with additional metadata
{
"token": { …read / write tokens for restricted access… }
"transcription": {[
"start_time" : "1523550398",
"end_time" : " 1523551036",
"text": "text transcription",
"tone": "emotion analysis of tone",
"image": "image capture of person speaking",
"data": { …user data analysis… }
]},
"status": "active",
"author": "Jonathan LeBlanc",
"currentState": "staging",
…
}
Enhanced File Payload
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Modern Cloud Data Security Practices
Regional Regulations
• General Data Protection Regulations (EU)
• Personal Information Protection and Electronic
Documents Act (Canada)
• Personal Information Protection Act (South Korea)
• etc.
Encrypted Data at Rest
Using encryption keys to be able to store data securely.
This can be done on a company and individual account
basis.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Document Retention and Disposition
How long should personal documents be stored for?
Should documents be retained for a period of time after deletion?
Should documents always be retained?
Regulatory Compliance
How do you ensure tight controls over how data is shared?
Ensuring data meets regulatory compliance standards:
• PCI DSS: Payment Card Industry Data Security Standard
• HIPAA: Health Insurance Portability and Accountability Act
• FedRAMP: Federal Risk and Authorization Management Program
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data
Data store &
initial metadata
Serverless Framework
Callback handler and code
execution
Machine Learning
Data processor and
enhancer
Webhook
Metadata
Execute
Callback
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
18
Access Tokens
Provides access to application and
root account, as well as the
machine learning account.
Privileged Data
The data that’s provided through
the transmission channels.
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Access Token
Master token with
full access
Downscoped Token
Limited token with tightly
scoped access
Timed Usage
Limited usage by
scope & time
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Cloud Data Secure Vault
Payment Issuer
Bank
1. PAN
6. Status 3. Token
2. PAN
5.Status
4.Token
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Data at Rest Data in Motion
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
How do we enhance the data?
How do we secure the data?
Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
Modern Cloud Data Security Practices

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnologySubhashKumar329
 
How Blockchains Are Transforming Adult Education
How Blockchains Are Transforming Adult EducationHow Blockchains Are Transforming Adult Education
How Blockchains Are Transforming Adult EducationJohn Domingue
 
Ijsrp published research paper november 2020
Ijsrp published research paper november 2020Ijsrp published research paper november 2020
Ijsrp published research paper november 2020shoaibulhassanuos
 
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)Melanie Swan
 
IRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET Journal
 
Decentralized Markets for Data and Artificial Intelligence
Decentralized Markets for Data and Artificial IntelligenceDecentralized Markets for Data and Artificial Intelligence
Decentralized Markets for Data and Artificial IntelligenceDimitri De Jonghe
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)JISC.AM
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
BigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worldsBigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worldsDimitri De Jonghe
 
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data MiningCollusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Miningdbpublications
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy lawJoe Mornin
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisAnton Chuvakin
 
Strategies for integrating semantic and blockchain technologies
Strategies for integrating semantic and blockchain technologiesStrategies for integrating semantic and blockchain technologies
Strategies for integrating semantic and blockchain technologiesHéctor Ugarte
 
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...John Domingue
 
Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the InternetVisibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Interneteraser Juan José Calderón
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Blockchain Network Theory
Blockchain Network TheoryBlockchain Network Theory
Blockchain Network TheoryMelanie Swan
 

Was ist angesagt? (20)

Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnology
 
How Blockchains Are Transforming Adult Education
How Blockchains Are Transforming Adult EducationHow Blockchains Are Transforming Adult Education
How Blockchains Are Transforming Adult Education
 
Ijsrp published research paper november 2020
Ijsrp published research paper november 2020Ijsrp published research paper november 2020
Ijsrp published research paper november 2020
 
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
 
IRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using Blockchain
 
Decentralized Markets for Data and Artificial Intelligence
Decentralized Markets for Data and Artificial IntelligenceDecentralized Markets for Data and Artificial Intelligence
Decentralized Markets for Data and Artificial Intelligence
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
BigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worldsBigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worlds
 
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data MiningCollusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
Collusion Attack: A Kernel-Based Privacy Preserving Techniques in Data Mining
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy law
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
Strategies for integrating semantic and blockchain technologies
Strategies for integrating semantic and blockchain technologiesStrategies for integrating semantic and blockchain technologies
Strategies for integrating semantic and blockchain technologies
 
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...
 
Visibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the InternetVisibility and digital art: Blockchain as an ownership layer on the Internet
Visibility and digital art: Blockchain as an ownership layer on the Internet
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Blockchain Network Theory
Blockchain Network TheoryBlockchain Network Theory
Blockchain Network Theory
 

Ähnlich wie Modern Cloud Data Security Practices

Big Data: The Magic to Attain New Heights
Big Data:  The Magic to Attain New HeightsBig Data:  The Magic to Attain New Heights
Big Data: The Magic to Attain New HeightsTEST Huddle
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sInside Analysis
 
JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachTeradata
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxwellesleyterresa
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...SunilKrPandey1
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
There is no right or wrong answer here; however, it is imperativ
There is no right or wrong answer here; however, it is imperativThere is no right or wrong answer here; however, it is imperativ
There is no right or wrong answer here; however, it is imperativGrazynaBroyles24
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoAlpha Momentum Indonesia
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
Blockchain in Banking Industry
Blockchain in Banking IndustryBlockchain in Banking Industry
Blockchain in Banking IndustryHigh Beam Global
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big dataHari Priya
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 

Ähnlich wie Modern Cloud Data Security Practices (20)

Big Data: The Magic to Attain New Heights
Big Data:  The Magic to Attain New HeightsBig Data:  The Magic to Attain New Heights
Big Data: The Magic to Attain New Heights
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today's
 
JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docx
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
There is no right or wrong answer here; however, it is imperativ
There is no right or wrong answer here; however, it is imperativThere is no right or wrong answer here; however, it is imperativ
There is no right or wrong answer here; however, it is imperativ
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Blockchain in Banking Industry
Blockchain in Banking IndustryBlockchain in Banking Industry
Blockchain in Banking Industry
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Big Data 101
Big Data 101Big Data 101
Big Data 101
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big data
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
The Future of Using Money
The Future of Using MoneyThe Future of Using Money
The Future of Using Money
 

Mehr von Jonathan LeBlanc

Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Mehr von Jonathan LeBlanc (20)

Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Kürzlich hochgeladen

Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 

Kürzlich hochgeladen (20)

201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 

Modern Cloud Data Security Practices

  • 2. The World of Interconnected Devices Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 3. A tale of a hackathon, voice payments, and the security through requests not to steal. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 4. Case Study: Fixing that massive security hole Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 5. How do we enhance the data? How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 6. How do we enhance the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 7. Serverless framework provides the compute and data management from stored data location to machine learning engine. Machine learning system provides the data enhancement capabilities which improves the underlying source data’s metadata (information about information). 7 Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 8. Case Study: Enhancing Video Indexing Data Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 9. Cloud Data Data store & initial metadata Serverless Framework Callback handler and code execution Machine Learning Data processor and enhancer Webhook Metadata Execute Callback Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 10. // JSON payload for a sample video file { "status": "active", "author": "Jonathan LeBlanc", "currentState": "staging", "type": "video-content-d086c908-2498-4d3e-8a1f-01e82bfc2abe", "parent": "folder_94784195", "id": "46586c534-21e1-619r-bera-521a0573914e", "version": 1, "typeVersion": 1, "scope": "enterprise_5425632” } Normal File Payload Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 11. // JSON payload for a sample video file with additional metadata { "token": { …read / write tokens for restricted access… } "transcription": {[ "start_time" : "1523550398", "end_time" : " 1523551036", "text": "text transcription", "tone": "emotion analysis of tone", "image": "image capture of person speaking", "data": { …user data analysis… } ]}, "status": "active", "author": "Jonathan LeBlanc", "currentState": "staging", … } Enhanced File Payload Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 12. How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 14. Regional Regulations • General Data Protection Regulations (EU) • Personal Information Protection and Electronic Documents Act (Canada) • Personal Information Protection Act (South Korea) • etc. Encrypted Data at Rest Using encryption keys to be able to store data securely. This can be done on a company and individual account basis. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 15. Document Retention and Disposition How long should personal documents be stored for? Should documents be retained for a period of time after deletion? Should documents always be retained? Regulatory Compliance How do you ensure tight controls over how data is shared? Ensuring data meets regulatory compliance standards: • PCI DSS: Payment Card Industry Data Security Standard • HIPAA: Health Insurance Portability and Accountability Act • FedRAMP: Federal Risk and Authorization Management Program Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 16. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 17. Cloud Data Data store & initial metadata Serverless Framework Callback handler and code execution Machine Learning Data processor and enhancer Webhook Metadata Execute Callback Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 18. 18 Access Tokens Provides access to application and root account, as well as the machine learning account. Privileged Data The data that’s provided through the transmission channels. Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 19. Access Token Master token with full access Downscoped Token Limited token with tightly scoped access Timed Usage Limited usage by scope & time Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 20. Cloud Data Secure Vault Payment Issuer Bank 1. PAN 6. Status 3. Token 2. PAN 5.Status 4.Token Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 21. Data at Rest Data in Motion Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com
  • 22. How do we enhance the data? How do we secure the data? Jonathan LeBlanc. | Twitter: @jcleblanc | Email: jleblanc@box.com

Hinweis der Redaktion

  1. Introduction - We're in an age where our digital lives, data, and many facets of our day to day lives are interconnected through a host of sites, services, and hardware, with a presence living within secure cloud data systems.
  2. Story time – hack supplying credit card information
  3. How we can solve the same issues with the hack
  4. Two questions - how do we enhance the data sources and how do we secure them
  5. Serverless frameworks and machine learning
  6. Use case of how these systems can work together
  7. Webhook -> Lambda -> ML Service -> Lambda callback -> Original data
  8. metadata payload for a file / folder
  9. metadata payload after having been adjusted with ML systems
  10. Data security by country - how much access does government have
  11. https://emrisk.com/cpt-blog/pci-hipaa-fedramp-cloud-compliance/
  12. http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html
  13. Webhook -> Lambda -> ML Service -> Lambda callback -> Original data
  14. Token security - providing downscoped tokens
  15. Tokenization for payment security http://www.paymentscardsandmobile.com/payment-card-tokenization/ https://www.emvco.com/terms-of-use/?u=/wp-content/uploads/documents/EMVCo-Payment-Tokenisation-Specification-Technical-Framework-v2.0-1.pdf
  16. Identity - data at rest vs data in motion
  17. Two questions - how do we enhance the data sources and how do we secure them