Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.

Slides:



Advertisements
Similar presentations
CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide April.
Advertisements

Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
David A. Brown Chief Information Security Officer State of Ohio
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security Governance
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Formulating a Security Policy for the Modern IT Landscape.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Evolving IT Framework Standards (Compliance and IT)
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
A National approach to Cyber security/CIIP: Raising awareness.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Scott Charney Cybercrime and Risk Management PwC.
New A.M. Best Cyber Questionnaire
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
FFIEC Cyber Security Assessment Tool
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Assuring Reliable and Secure IT Services Chapter 6.
Chapter 1: Security Governance Through Principles and Policies
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Cybersecurity: Risk Management
Cyber Insurance Risk Transfer Alternatives
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Managing Compliance for All Departments
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Security Risk Profiles – Tips and Tricks
Capabilities Matrix Access and Authentication
San Francisco IIA Fall Seminar
5G Security Training
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Strategy: If you don’t know where you’re going, you’ll never get there
Managing Information Resources, Control & Security
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
An Urgent National Imperative
PGE Chris Nolke, Director of Cybersecurity
Security as Risk Management
Cyber Risk & Cyber Insurance - Overview
Cybersecurity ATD technical
Cybersecurity Framework For Energy Sector
Final Conference 18 Set 2018.
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Data Security and Privacy Techniques for Modern Databases
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015

Benefits to you 1) More effective coverage of the tools you have 2) Clear out agent cruft 3) Free up resources to do more

Agent Fatigue

Reason why we're here Wikipedia

More reasons

Because… reasons

Framework

Imma let you finish, but...

Culture affects framework Build our own Free tools & become experts Buy vs. Build Outsource it all

Security principles statement

Prerequisites Prevention Detection Response

Prerequisites Prevention Detection ResponseAnalysis Deterrent

Framework Governance (policies, standards, procedures, relationships, measurements, education) Information oversight Access management Threat projections Infrastructure protection (physical & logical) Penetration detection Incident management

Another way Protecting Monitoring Responding (re)defining Physical Logical attack misuse Root cause analysis recovery Governance awareness Assets Network effectiveness

Measure capabilities Stop Look Listen

Matrix of capabilities

Cross reference with threats

Prioritize based on risks wikipedia

Get from this...

… to this

Questions?

References NIST Framework for Improving Critical Infrastructure CyberSecurity 1.0 Feb ISO/IEC 27032:2012 Information Technology – Security Techniques – Guidelines for cybersecurity SANS Top 20 Critical Security Controls Australian Signals Directorate Strategies to Mitigate Targeted Cyber Intrusion