Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Data Security @ the personal level
Search
Sponsored
·
Ship Features Fearlessly
Turn features on and off without deploys. Used by thousands of Ruby developers.
→
Arnon Rotem-Gal-Oz
PRO
April 20, 2017
Technology
0
28
Data Security @ the personal level
personal security briefing to employees (e.g for ISO 27001 compliance)
Arnon Rotem-Gal-Oz
PRO
April 20, 2017
Tweet
Share
More Decks by Arnon Rotem-Gal-Oz
See All by Arnon Rotem-Gal-Oz
Coding with AI
arnonrgo
PRO
0
3
Brownfield Architecture transformations
arnonrgo
PRO
0
140
Software architecture 101
arnonrgo
PRO
0
1.7k
Apache Spark - Overview
arnonrgo
PRO
0
46
Taking ML to production - a journey
arnonrgo
PRO
0
120
Topics in Distributed Systems
arnonrgo
PRO
0
33
Docker & Kubernetes
arnonrgo
PRO
0
27
Microservices it's deja vu all over again
arnonrgo
PRO
0
26
Big Data in the Cloud - Welcome to cost oriented design
arnonrgo
PRO
0
23
Other Decks in Technology
See All in Technology
ブロックテーマでサイトをリニューアルした話 / 2026-01-31 Kansai WordPress Meetup
torounit
0
460
Frontier Agents (Kiro autonomous agent / AWS Security Agent / AWS DevOps Agent) の紹介
msysh
3
170
マーケットプレイス版Oracle WebCenter Content For OCI
oracle4engineer
PRO
5
1.6k
All About Sansan – for New Global Engineers
sansan33
PRO
1
1.3k
M&A 後の統合をどう進めるか ─ ナレッジワーク × Poetics が実践した組織とシステムの融合
kworkdev
PRO
1
430
AzureでのIaC - Bicep? Terraform? それ早く言ってよ会議
torumakabe
1
530
AWS Network Firewall Proxyを触ってみた
nagisa53
1
230
Bedrock PolicyでAmazon Bedrock Guardrails利用を強制してみた
yuu551
0
220
Tebiki Engineering Team Deck
tebiki
0
24k
StrandsとNeptuneを使ってナレッジグラフを構築する
yakumo
1
110
[CV勉強会@関東 World Model 読み会] Orbis: Overcoming Challenges of Long-Horizon Prediction in Driving World Models (Mousakhan+, NeurIPS 2025)
abemii
0
130
Amazon Bedrock Knowledge Basesチャンキング解説!
aoinoguchi
0
140
Featured
See All Featured
YesSQL, Process and Tooling at Scale
rocio
174
15k
The Anti-SEO Checklist Checklist. Pubcon Cyber Week
ryanjones
0
62
Jess Joyce - The Pitfalls of Following Frameworks
techseoconnect
PRO
1
64
Public Speaking Without Barfing On Your Shoes - THAT 2023
reverentgeek
1
300
The Curse of the Amulet
leimatthew05
1
8.5k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
333
22k
Have SEOs Ruined the Internet? - User Awareness of SEO in 2025
akashhashmi
0
270
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
122
21k
Avoiding the “Bad Training, Faster” Trap in the Age of AI
tmiket
0
76
<Decoding/> the Language of Devs - We Love SEO 2024
nikkihalliwell
1
130
Rebuilding a faster, lazier Slack
samanthasiow
85
9.4k
Principles of Awesome APIs and How to Build Them.
keavy
128
17k
Transcript
Data Security (@ the personal level) Arnon Rotem-Gal-Oz
So what’s so important about “information security”?
Security is a real problem www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Information security? Not MY problem - IT should figure
it out
We’ve met the enemy and he is us
• Hardware • Software • People • Procedur es •
Data
Formal threat analysis The STRIDE model
Also see • OWASP https://www.owasp.org/ • https://www.owasp.org/index.php/Threat_Risk_Modeling#STRIDE • Common Criteria https://www.commoncriteriaportal.org/
Spoofing (of user identity) Tampering Repudiation Information
disclosure Denial of service Elevation of privilege
None
None
On the other hand…
None
None
Passwords
None
2016 is just as bad
None
None
Physical theft/loss
Protect your assets
Pay attention to email/text recipient address
Malware
It is up to you!
•Be mindful •Be careful who you trust •Secure your devices
•Report problems