Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Kelsey Gilmore-Innis - Seriously Strong Securit...
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
PyCon 2016
June 01, 2016
Programming
6
960
Kelsey Gilmore-Innis - Seriously Strong Security on a Shoestring
PyCon 2016
June 01, 2016
Tweet
Share
More Decks by PyCon 2016
See All by PyCon 2016
Manuel Ebert - Putting 1 million new words into the dictionary
pycon2016
6
950
Brett Slatkin - Refactoring Python: Why and how to restructure your code
pycon2016
17
5.7k
Mike Graham - The Life Cycle of a Python Class
pycon2016
7
8.9k
Nathaniel Manista, Augie Fackler - Code Unto Others
pycon2016
0
530
Alex Gaynor - The cobbler's children have no shoes, or building better tools for ourselves
pycon2016
0
800
Adrienne Lowe - Bake the Cookies, Wear the Dress: Connecting with Confident Authenticity
pycon2016
0
380
Jake Vanderplas - Statistics for Hackers
pycon2016
19
8.5k
Daniele Procida - Documentation-driven development - lessons from the Django Project
pycon2016
3
880
Shannon Quinn - Python for Public Health: Building Statistical Models of Ciliary Motion
pycon2016
0
570
Other Decks in Programming
See All in Programming
エンジニアの「手元の自動化」を加速するn8n 2026.02.27
symy2co
0
160
技術検証結果の整理と解析をAIに任せよう!
keisukeikeda
0
120
S3ストレージクラスの「見える」「ある」「使える」は全部違う ─ 体験から見た、仕様の深淵を覗く
ya_ma23
0
580
CSC307 Lecture 15
javiergs
PRO
0
250
TipKitTips
ktcryomm
0
170
Goの型安全性で実現する複数プロダクトの権限管理
ishikawa_pro
2
350
受け入れテスト駆動開発(ATDD)×AI駆動開発 AI時代のATDDの取り組み方を考える
kztakasaki
2
590
AI時代のシステム設計:ドメインモデルで変更しやすさを守る設計戦略
masuda220
PRO
5
1k
RubyとGoでゼロから作る証券システム: 高信頼性が求められるシステムのコードの外側にある設計と運用のリアル
free_world21
0
290
nuget-server - あなたが必要だったNuGetサーバー
kekyo
PRO
0
260
20260315 AWSなんもわからん🥲
chiilog
2
160
「やめとこ」がなくなった — 1月にZennを始めて22本書いた AI共創開発のリアル
atani14
0
390
Featured
See All Featured
Practical Orchestrator
shlominoach
191
11k
Information Architects: The Missing Link in Design Systems
soysaucechin
0
830
BBQ
matthewcrist
89
10k
Keith and Marios Guide to Fast Websites
keithpitt
413
23k
Stewardship and Sustainability of Urban and Community Forests
pwiseman
0
140
Navigating the moral maze — ethical principles for Al-driven product design
skipperchong
2
290
Ethics towards AI in product and experience design
skipperchong
2
220
Jess Joyce - The Pitfalls of Following Frameworks
techseoconnect
PRO
1
110
Neural Spatial Audio Processing for Sound Field Analysis and Control
skoyamalab
0
220
Hiding What from Whom? A Critical Review of the History of Programming languages for Music
tomoyanonymous
2
550
The Curious Case for Waylosing
cassininazir
0
270
Self-Hosted WebAssembly Runtime for Runtime-Neutral Checkpoint/Restore in Edge–Cloud Continuum
chikuwait
0
400
Transcript
SERIOUSLY STRONG SECURITY ON A SHOESTRING content warning: sexual assault
SERIOUSLY STRONG SECURITY ON A SHOESTRING Kelsey Gilmore-Innis @_K_E_L_S_E_Y nerd.kelseyinnis.com
Callisto www.projectcallisto.org
IT DOESN’T TAKE AN ARMY
YOU CAN’T SECURE DATA ON THE INTERNET
YOU CAN SECURE DATA ON THE INTERNET
START FROM SOLID FOUNDATIONS
KNOW YOUR STRENGTHS
KNOW YOUR STRENGTHS •CLOUD HOSTING •PLATFORM AS A SERVICE •CONTENT
DISTRIBUTION NETWORKS
KNOW YOUR THREATS
SECURITY REQUIRES EMPATHY
YOUR BIGGEST THREAT IS IN THIS ROOM
YOUR SECOND BIGGEST THREAT IS WHO YOU’RE TRYING TO PROTECT
TELL ME YOUR CAT’S NAME AND I CAN ACCESS YOUR
WHOLE WORLD • ZXCVBN • CMU’s USABLE PRIVACY & SECURITY LAB • RATE LIMITING
“COMPUTER” CAN MEAN MANY THINGS
BOUNDARIES ARE HARD
DON’T GET CUTE
BE LAZY BUT NOT COMPLACENT
PAY SOMEONE SMARTER
THANKS! www.projectcallisto.org nerd.kelseyinnis.com