Learn more about the annual
Open Source Security Summit.
Open Source & Security
The third annual Open Source Security Summit shines a spotlight on the global community of cybersecurity and open source software experts with speakers ranging from Romania to Santa Barbara, California. This event brought together thought leaders, industry examples of open source security in action, and bustling commentary from participants all over the world!
The Open Source Security Summit provides a space for companies and individuals to discuss how utilizing open source technologies leads to stronger security and trust through transparency.
Highlights from this year included Kevin Mitnick, the world’s most famous hacker, Eva Galperin the director of cybersecurity at the Electronic Frontier Foundation (EFF), and one of the most popular security speakers and author, Mikko Hypponen.
To catch up on
Keynotes
Mikko Hypponen
Kicking off the summit with his keynote address,
“The internet is the best and worst thing that has happened in our lifetime. But the upsides are much bigger than the downsides… we are living in the middle of the biggest technological revolution that mankind has ever seen.”
One significant downside, of course, is the rise of malware and cybercrime, a realm that has grown exponentially over the past few decades as we have brought more and more smart devices and applications into our homes, our work, and our communities.
“When a company doesn’t get hacked, that’s not a headline… rarely is anyone thanked for stopping a disaster that didn’t happen.”
Mikko’s book
Eva Galperin
Eva Galperin is the director of cybersecurity at the
“We need to use our power as cybersecurity professionals to protect the people at the margins whose concerns are really not brought to the center at the design stage or, indeed, at any stage in the technology development process.”
Eva offers the following
Start with diversity: The more people in the room making decisions about your product, the more use cases you will be able to identify.
Privacy & choice: If there is only one product that does the thing you need, then you don’t have a choice. Users must be able to make informed decisions about privacy settings.
Combat gaslighting: Timely notifications and auditing are essential.
Security & data: Users should understand who has access to their data and be able to cut someone off quickly and decisively.
Technical ability: Take into account all levels of technical ability so that one user cannot be controlled by another because they don’t know how to use your product.
Kevin Mitnick
Decades before encrypted messaging apps were around, as a teenager Kevin and his friends would do “phone freaking” - finding workarounds through the phone companies’ computer systems so they could call a designated number and talk anonymously. Then in college, he hacked his first password - his professor’s password. To learn more about Kevin’s story, see his book
In his current line of work, he deploys social engineering and other phishing attack simulations: “Trust is critical to deception. If you can get the target to trust you, the deception is likely to work.” The way for businesses and individuals to defend against an attack is security awareness training or to increase physical security requirements like YubiKeys, “it’s either training, YubiKeys, or both.” The human element is the weakest link in security. Kevin also demonstrated how his team compromises machines for clients who store their
The best defense to protect yourself from hackers? Hacker Kevin recommends “combining password manager with FIDO2 with a YubiKey or security token that you have to plug into the machine to authenticate yourself.” For any passwords you need to remember, he recommends using a sentence with spaces and punctuation for your passphrase because they are 1) easier to remember and 2) very hard to guess.
Bitwarden Case Studies
The conference also featured four case studies from Bitwarden users Greenpeace, Bitdefender, Ocrolus, and InMotion Hosting.
Bitdefender
According to Mihai Talmacel from
Ocrolus
To prevent the use of shadow IT, Julian Cohen, VP of security and CISO at
InMotion Hosting
Noah Ablaseau, SysOps senior platform and security engineer at
For Noah and his team, understanding users and their needs is the most important piece to getting started with a security option that works for your team and keeps your business secure. From his experience, “the worst thing that can happen is to have a user base afraid to report that they made a mistake,” if they don’t feel comfortable coming forward, you won’t have the opportunity to provide additional training or address security gaps.
Industry Speakers
The Open Source Security Summit is a forum for intersectional conversation across industries and borders. The 2022 summit featured speakers from Proton, the FIDO Alliance, CISA, SeMI Technologies, RaivoOTP, Cryptomator, and Cryptpad.
Proton
Daniel Huigens, cryptography team lead at
FIDO Alliance
David Turner, director of standards development from the
CISA
Allan Friedman, senior advisor and strategist from the
For example, “If I go out and buy a Twinkie, it's going to come with a list of ingredients. Why don't we expect that same level of transparency that we get from a non-biodegradable snack that we would expect in the software that runs our world, our critical infrastructure, and our most important systems.”
Knowing the ingredients in your software supply chain doesn’t mean you will “stick to your diet” or never find vulnerabilities, but it does mean that you will have a better idea of what to look out for as you build your company’s security systems or your personal digital footprint.
SeMI Technologies
Bob van Luijt, CEO of
RaivoOTP
Tijme Gommers, product lead adversary simulation at
Cryptpad
Collaboration & Privacy
David Benquė, design lead at
Cryptomator
Sebastian Stenzel, CTO at Skymatic spoke about the platform
The best way to accommodate the human factor? Make sure your tools and policies don’t outpace the adoption rate within your teams.
Next Steps
One simple yet powerful first step toward protecting yourself and your loved ones online is to use a password manager. Get started today with a
See you at the Open Source Security Summit in 2023!