Stilgherrian (@stilgherrian)

Wentworth Falls NSW AU

The below is an off-site archive of all tweets posted by @stilgherrian ever

August 20th, 2013

@Asher_Wolf @leslienassar Actually, I don’t think I have written anything quite like what you’re after.

via Janetter for Mac in reply to Asher_Wolf

@snerdish @glengyron Hence the sadness. I see a jumble of personal anxieties in that piece. They’ve been triggered, she runs and hides.

via Janetter for Mac in reply to snerdish

Actually it’s more sad than funny.

via Janetter for Mac

This is the Groklaw piece of which I speak. groklaw.net/article.php?st…

via Janetter for Mac

I’ve just read the Groklaw thing. Fuckin’ hilarious.

via Janetter for Mac

@elronxenu “s/writing/publishing/”. Mission 2 accomplished.

via Janetter for Mac in reply to elronxenu

“I’ll show those fucking Nazis! I’ll stop writing my blog!” Yeah well there’s 20 bonus points for joined-up thinking.

via Janetter for Mac

RT @ChrissieM: “This is like the baby bonus on steroids” - @DavidBradburyMP [STEROID BABIES FTW!]

via Janetter for Mac

ChrissieM “This is like the baby bonus on steroids” - @DavidBradburyMP

via Tweetbot for iOS (retweeted on 7:59 PM, Aug 20th, 2013 via Janetter for Mac)

That’s right @stokely. More articles that are lists of shit copied off Twitter. That’s EXACTLY what our flagship media needs to be doing.

via Janetter for Mac

RT @stokely: I can’t believe this SMH article published so few of the zingers. Opportunity… lostsmh.com.au/digital-life/d…1m

via Janetter for Mac

Pro tip: To indicate that you understand the internet, add “#” in front of words in every tweet. The more you use, the smarter you’ll look.

via Janetter for Mac

Pro tip: To avoid doubts about your masculinity while drinking, emit a continuous series of loud, inarticulate sounds.

via Janetter for Mac

TheWarNerd .@FucktardIdiot Drugs were the most glorious thing in my early life. Drugs are to this era what whores were to the Victorians.

via Twitter Web Client (retweeted on 6:17 PM, Aug 20th, 2013 via Janetter for Mac)

“Drinks at the pub,” you say, @StuartCRyan? Why that’s an excellent suggestion.

via Janetter for Mac

This is my last tweet from the Gartner Security and Risk Management Summit. Now what?

via Janetter for Mac

Gartner’s Rob McMillan says their analysts blog about this stuff, so feel free to challenge them. Updates to be tweeted, tagged

via Janetter for Mac

[There were many more examples and signs listed in that presentation. I’ll post the download link as soon as I have it.]

via Janetter for Mac

3. Monitor the environment for scenario milestones as they occur. 4. Implement your startegy.

via Janetter for Mac

Your to-do? 1. Analyse impact of four quadrants of your organisation. 2. Outline your response using the analysis tool.

via Janetter for Mac

Gartner has further phases of this research to come.

via Janetter for Mac

[So, the problem has been outlined, Gartner’s tools for tackling it have been described… now buy the tools and training.]

via Janetter for Mac

Byrnes presents a graphic tool to help decide what sort of “controls” to concentrate on, depending on which scenario unfolds.

via Janetter for Mac

Scenario 4: E-commerce drops, with reputation and trust problems, but [DAMN I MISSED THE SLIDE. I’ll post it all later.]

via Janetter for Mac

Scenario 3: Privacy regulation will limit business opportunities, but surveillance society benefits those who do big data well.

via Janetter for Mac

Scenario 2: More attacks mean more damage, but you might found and then dominate an industry standard group. [Cynic!]

via Janetter for Mac

Scenario 1: Over-regulation might increase costs, but lobbying could influence its direction and degree.

via Janetter for Mac

There’s evidence for all four scenarios. So plan for all of them, watch for signs of which one is developing.

via Janetter for Mac

Evidence for this scenario includes the Islamic hacktivists.

via Janetter for Mac

E-commerce declines due to distrust, civil cyber-strife. Anonymous hits CEOs not businesses. Corporations refuse to hold data/.

via Janetter for Mac

Scenario 4 is individual targets, authority breakdown. E-militias vs extreme anarcho-hacktivism. Communal walled gardens form.

via Janetter for Mac

Pervasive internet tracking, growth of darknet, mobile devices become closed, register all internet users. “Wait, that’s NSA.”

via Janetter for Mac

Scenario 3 is individual targets, centralised authority. Attacks force government to act. Rise of surveillance state.

via Janetter for Mac

Byrnes says there’s already evidence of a rise in corporate espionage in recent years.

via Janetter for Mac

Imagine an IPO for a cyberwar mercenary startup, more crypto-extortion schemes [already happening].

via Janetter for Mac

Potential signs this is happening? Corporate counter-attack, financial industry forms cyber-war department…

via Janetter for Mac

Think the Cyber Security Alliance, the Cloud Security Alliance, drug cartel use of the internet.

via Janetter for Mac

Scenario two is enterprise targets and fragmented authority. Warlords, cartel rule, hacktivism, aggressive corporate espionage.

via Janetter for Mac

You might also see Monroe Doctrine-like rules of engagement, or statements that cyber attacks count as an act of war.

via Janetter for Mac

Signs this is happening would be NATO creating a cyber-decurity division, stronger shaming and fines for data breaches etc.

via Janetter for Mac

All infrastructure becomes critical infrastructure and becomes regulated.

via Janetter for Mac

With enterprise targets and centralised authority, you get things like the US critical infrastructure directive.

via Janetter for Mac

So, targets range from enterprise to individuals, defences from centralised authoritarian to tribal “neighbourhood watch” style.

via Janetter for Mac

The other axis is who will save us? Nation-states as monolithic control? Or the tribal, individual defences?

via Janetter for Mac

One axis of the scenario is about what will be targeted, the servers or the end nodes. What are the motiviations.

via Janetter for Mac

How many of these originally white-hat hackers turn to the dark side?

via Janetter for Mac

There’s currently 100+ university courses in the US teaching security techniques through hacking, similar proportion elsewhere.

via Janetter for Mac

Servers move to cloud, mobile devices blur the perimeter etc. Hacking tools get better and cheaper. The number of hackers rises.

via Janetter for Mac

Scenario planning process identifies the most powerful forces at work, and then examines how they will change the world.

via Janetter for Mac

Byrnes: “We need to plan ahead because the rate of change is going to increase.”

via Janetter for Mac

The change is as huge as the change from mainframe computing to distributed systems, when computer security ceased to exist.

via Janetter for Mac

Fact: The real world changes. It no longer works to base control decisions.”

via Janetter for Mac

Byrnes says it’s not to scare you, but to provide a set of mental constructs to use in setting your strategic plans.

via Janetter for Mac

Entire Gartner security team ~50 people developed the scenario, marketing firm help set the names of evrything.

via Janetter for Mac

Closing keynote: “The Gartner Five-Year Security and Risk Scenario”, F Christian Byrnes on stage first.

via Janetter for Mac

@dobes @thelaughingsub @mukimu I stick my what in what now? To monetise it? Well, that business model has been around for a while now…

via Janetter for Mac in reply to dobes

@thelaughingsub @mukimu “We are the Sarcasm Pirates, and we shall pwn your meanings!”

via Janetter for Mac in reply to thelaughingsub

Quietly gathering my thoughts before the final keynote, “The Gartner Five-Year Security and Risk Scenario”, at 1615 AEST.

via Janetter for Mac

The word missing from an earlier tweet, which may have caused confusion, was “breakfast”.

via Janetter for Mac

My underwear is quite snug, thank you @alexkidman @jendudley!

via Janetter for Mac

@SimonSheridan2 @joneaves Perhaps, but it seems an awkward choice, given the traditional meanings of “pivot”.

via Janetter for Mac in reply to SimonSheridan2

“Privacy Policies: Why Slavishly Following The Law Doesn’t Help”, writes @gusworldau lifehacker.com.au/2013/08/privac…

via Janetter for Mac

@jendudley Could you control the sounds a whoopie cushion makes using a Raspberry Pi? Internet Farts as a Service? In the cloud, natch.

via Janetter for Mac in reply to jendudley

RT @argumentalist: This term may come from foreign affairs strategy. Eg Australia as US’ strategic ‘pivot’ into Asia. [That could well be.]

via Janetter for Mac

@kjmci @leslienassar I haven’t formed an opinion on battery life, ‘cos my usage patterns are too variable.

via Janetter for Mac in reply to kjmci

@christopherneal I’m currently sitting on that row of benches in the trade show area.

via Janetter for Mac in reply to christopherneal

“The CISO shouldn’t be the defender of security: Gartner”, writes @mukimu zdnet.com/the-ciso-shoul…

via Janetter for Mac

“The real vulnerabilities lie in operation technology: Gartner”, writes @patrick_budmar arnnet.com.au/article/524070…

via Janetter for Mac

“Cyber security is all hype and no substance: Gartner”, writes @patrick_budmar arnnet.com.au/article/524158…

via Janetter for Mac

RT @byzantinejo: I heard someone the other day refer to prioritising as “Gripping Up” an issue…corporate speak is evil! [Oh Jesus wept!]

via Janetter for Mac

“Website privacy policies need overhaul: experts”, writes @HamishBarwick computerworld.com.au/article/524170…

via Janetter for Mac

So which arsehat decided that corporate-speak would start calling changes in strategy a “pivot”? A pivot is a turn WITHOUT MOVING FORWARD!

via Janetter for Mac

@leslienassar @kjmci Agreed with your Nokia Lumia 925 quality-kit comment. If only it came in Android…

via Janetter for Mac in reply to leslienassar

Well that’s the first four meetings of the day done and dusted. Where is the gin cart?

via Janetter for Mac

Actually, I won’t tweet that much this morning because I “cleverly” scheduled back to back meetings. I am an arsehat.

via Twitter for Windows Phone

The navigation in the official Twitter app for Windows Phone seems to have been designed by a spider on ketamine.

via Twitter for Windows Phone

Mobile: Check out; bus to Sydney CBD; quick and inadequate (yeah, I fucked that up!); 0930 Hilton Hotel to start my day of conferencing.

via Janetter for Mac

@19bk69 Thanks. I’m finding the live feedback on what are effectively my notes useful, too. I will reassess my distrust of liveblogging.

via Janetter for Mac in reply to 19bk69

@girlgerms See, it’s the practice and refinement. My pack-for-travel routine is 10 mins, or 15 mins for international trips.

via Janetter for Mac in reply to girlgerms

@bgosford How do you get the phone into the boot? Surely there’s a snake or lizard in there?

via Janetter for Mac in reply to bgosford

Gawd, this having to be in a certain physical location with pants on to do your work and interact pisses away so much time in the morning.

via Janetter for Mac

“Australian Twitter News Index: Fairfax Paywall Bites Hard”, writes @snurb_dot_info theconversation.com/australian-twi… HT @charispalmer

via Janetter for Mac

Like yesterday, I’ll be tweeing heavily from the Gartner security event. Filter out the hashtag to avoid.

via Janetter for Mac

Tue plan: Gartner Security and Risk Management Summit all day gartner.com/technology/sum…; train to Wentworth Falls, time TBA; collapse.

via Janetter for Mac

@christopherneal Indeed it would. I’ve managed to over-pack my morning, but any time after 1330 could work for me.

via Janetter for Mac in reply to christopherneal

@jeffsonstein @WatchAdam I don’t think any of the Gartner people were suggesting this hasn’t been noted before.

via Janetter for Mac in reply to jeffsonstein

@llament @jujueyeball It’s a bit stronger than “suggests”. It’s interesting that an ineffective technical measure is still a crime to avoid.

via Janetter for Mac in reply to llament

“Can removing security controls actually make businesses safer?”, writes @mukimu zdnet.com/can-removing-s…

via Janetter for Mac

“Why Security Hasn’t Moved Into The Cloud (Yet)”, writes @gusworldau lifehacker.com.au/2013/08/why-se…

via Janetter for Mac

“Internet of Things expands security threat landscape: Gartner”, writes @WatchAdam computerworld.com.au/article/524050…

via Janetter for Mac

SnarkyPlatypus Getting the strong impression that your freedoms will be defended in the USA as long as you turn yourself into a company.

via Tweetbot for iOS (retweeted on 7:01 AM, Aug 20th, 2013 via Janetter for Mac)

snerdish @stilgherrian @juhasaarinen all humans to be issued with their ip address at birth. Maybe they could tatoo it on.

via Twitter for Android (retweeted on 7:00 AM, Aug 20th, 2013 via Janetter for Mac)

juhasaarinen .@stilgherrian And which runs counter to what the Aussie govt suggested to bypass geoblocking, as @aBleeter notes.

via TweetDeck (retweeted on 7:00 AM, Aug 20th, 2013 via Janetter for Mac)

I’ll admit, @jujueyeball, I’d have to read a little more closely than my blurry mind allows just yet this morning.

via Janetter for Mac

RT @jujueyeball: That last part overstates a bit, no? This was criminal bc Craigslist specifically revoked authorization access [Perhaps.]

via Janetter for Mac

“A violation of the Computer Fraud and Abuse Act (CFAA)”, @juhasaarinen? We have something we might informally call “location fraud”!

via Janetter for Mac

RT @juhasaarinen: Changing IP address to access public website ruled violation of US law ars.to/19ttcna VPN, proxy use criminal.

via Janetter for Mac

RT @chort0: publicintelligence.net/fbi-aviation-a… “Every organization is at risk of being the target of an APT attack.” [Thanks, will use this Wednesday.]

via Janetter for Mac

Tue plan, draft: Gartner Security and Risk Management Summit all day gartner.com/technology/sum…; train to Wentworth Falls, time TBA; collapse.

via Janetter for Mac

Hello, Tuesday. Cuddly little Tuesday.

via Janetter for Mac