Security Themes Debunked

Slides:



Advertisements
Similar presentations
Boost your network security with NETASQ Vulnerability Manager.
Advertisements

Cyber Security Audit and Network Monitoring P.D. Mynatt Doug Brown March 19 th 2015.
Ergonomic Fix Ergonomics team changed design of part to completely eliminate this hazard No change in cost of part & cost savings of labor alone is $25,000.
[Name / Title] [Date] Effective Threat Protection Strategies.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Holistic Approach to Security
The Steel Method SALES MANAGEMENT Stop Hiding Start Managing 2.0.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Exclusive Business to Business CRM
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
AUDITING Elysa Hartati.
Michael Wright • Chief Security Officer • Tech Lock
Getting Started with Flow
Your Company Name [Note: Font size of your presentation should be the average age of your audience divided by 2] Copyright 2010 Venture Mechanics, LLC.
The 6 Marketing Metrics Investors Care About
3 Do you monitor for unauthorized intrusion activity?
Lessons from the Field: 7 Steps to Proactive Cybersecurity
Six Steps to Secure Access for Privileged Insiders and Vendors
Philosophy I think it’s good to be realistic, in between a pessimist and optimist.
Comprehensive Security and Compliance at an Affordable Price.
Team 1 – Incident Response
The 1 Rules of SUCCESS.
Cyber Security: State of the Nation
Compliance with hardening standards
of our Partners and Customers
It’s not all about the tool!
Visibility and Automation in the Evolving Security Landscape
Putting It All Together
Putting It All Together
Leverage What’s Out There
Think Outside Yourself
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
Speaker’s Name, SAP Month 00, 2017
Dr Paul Lewis Chief Technology Officer
Unit 7 – Organisational Systems Security
Transforming IT Management
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Marketing automation is a very active segment of the CRM software market. Not only are new vendors entering the market, but existing market leaders are.
Company Overview & Strategy
Consulting Services for IoT
How to build a defense-in-depth
Varonis Overview.
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Case Study Modernizing an Operational Data Architecture
8 Reasons You Need a Security Penetration Test
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Visit mmbiconsulting.com
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
Healthcare Cloud Security Stack for Microsoft Azure
Risk Management CSCE 489/689 (Software Security) Fall 2018
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Cyber Security Culture
NSX Data Center for Security
How to address security, cost, IT and migration concerns
The $100,000 a Year Local Online Business Blueprint
Recommended Lead Seller
Marzano Vocabulary Instruction Follow-Up
No!. [NEXT SLIDE] LOGO HERE.
3 Do you monitor for unauthorized intrusion activity?
The place where people go to learn.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Healthcare Cloud Security Stack for Microsoft Azure
KEY INITIATIVE Internal Control and Technical Accounting
Protect data in core business applications
Business Case Template
3 Do you monitor for unauthorized intrusion activity?
“Workplace Behaviour: Activating your greatest security asset”
Generate the Best Leads using Marketing Service From Global Mail Media GLOBAL MAIL MEDIA
Presentation transcript:

Security Themes Debunked Brian Minick Security Themes Debunked

Who is this guy? Brian Minick CEO and Founder of Morphick CISO General Electric Aviation Energy Transportation Industry leader across: Defense Industrial Base DSIE Policy consulting: White House Department of State Pentagon NSA Personal Three daughters Running Church (my second startup)

Security is noisy A lot of people trying to get your attention and your $$$ A lot of investment A lot of messages One dimensional thinking is dangerous The best lie is based on truth How do you know what to believe? Let’s look at some messages

Technology will save the day The claims Our technology solves your security issues Most effective way to stop attacks Make your team more effective The reality Our technology solves your security issues…or just a couple of them. Most effective way to stop attacks...at least for today Attackers figure out a way around. Signature, reputation, whitelist, sandbox, analytics, what’s next? Make your team more effective…by giving them more work to do Security is too large a space to find one technology to solve all the issues (insider attacks, outsider attacks, account management, firewall rule management, patch management, on and on) All businesses end up with numerous technologies that do not work together. Orchestration is next big thing because of all the point solutions. There is a difference between random and targeted attacks. Technology is effective against random attacks…at least in the mid term Targeted attacks are driven by people and people figure out ways around tech Most detection technology turned into work generation systems.

Process will save the day The claims Compliance with standards will solve security problems Risk based controls effectively prioritize Standards create an effective measuring stick The reality Compliance with standards will solve security problems…or auditor problems Risk based controls effectively prioritize…just not quickly enough Standards create an effective measuring stick… Things take on a life of their own. Don’t lose sight of the goal, which is to protect the business, not to pass an audit. Risk based is great, but how quickly is risk assessed and changed? Hyper risk assessment. Risk doesn’t change with every attack. Risk changes with targeted attacks though. Need an effective measuring stick, current standards need updated. Acknowledge the difference between random and targeted, include rapid change capabilities for targeted.

Smart people will save the day The claims Nothing works without the right people They built it once, they can do it again It just takes a couple great people The reality Nothing works without the right people…and process and tech They built it once, they can do it again…if everything else is equal It just takes a couple great people…and an army behind them

Reality is never simple Truth in all these messages None offer a complete picture People, process and technology is required

Different problems different approaches Random Adversary is a computer program Find the solution and repeat it A product will solve the problem Security through compliance Targeted Adversary is a person using a computer program Creativity and strategy People need to solve the problem Unique, morphing defenses

Where is cyber headed - random Dealing with random attacks Technology to address technology Technology to automate process Technology to eliminate people Technology direction This is an arms race The race is fought at the industry level

Where is cyber headed - Targeted Dealing with targeted attacks People to address people Technology for efficiency and agility Process to morph defenses Technology direction This is an arms race It is fought by your company only

Reality is complicated…and so is security So what Reality is complicated…and so is security Security is a broad discipline No company can do it all alone No vendor can do it all for their customers Find an ally What are your current strengths What strengths do you want to develop What allies can you identify to help develop those strengths and fill your weaknesses?