Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

Similar presentations


Presentation on theme: "Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security."— Presentation transcript:

1 Jeff Williams 2015

2  Intro  Awesome Times  Security Briefing  Service with Security

3  Deloitte & Touché consultant during Y2K  Santa Clara County Office of Education  Supported Payroll, financial and human resource systems in 44 district, in two counties  California State University  9 year in Information Security and resent appoint to Director of Customer Service  Security experience from briefings (e.g. state, Infragard, Verizon), trainings (e.g. CISA, CISSP and Incident Handler), books (e.g. ) and most important from experience  Philosophy & MBA  All views, misquotes and materials out of context are the solely my fault; I’m here to paint you a picture and encourage you to grow

4 Meet the business goal with Changing Technology that is Fragile  Three stories  Big Data  Ted Talks on Machine Learning  Geekonomics

5  Even Data Changes  3rd Millennium BC  12th-16th century  14 th century

6 We solve our problems with the tools available  Rigid exactitude  Correlation  What, not why

7 “The wonderful and terrifying implication of computers that can learn” Jeremy Howard

8

9

10

11

12  Portland Cement  No Virtual Crash Test Dummies

13 Meet the business goal WITH Changing Technology THAT Is Fragile

14  Infragard Briefings  Verizon Report and Briefings  Dell SecureWorks Briefings  Microsoft Briefings  SANS.org training and Briefings

15

16

17  Pre-2008 – The lone wolfs…wolves are pack animals  2008 - roll up high profile Hackers  2009 - China hires Russian Hackers  steals cyber attack IP  2010 - Move to single high value target - multi-verification  2011 – Russian Hackers become patriots  2012 - Iran (mother of all cyber attacks, DDoS US banks)  Iran provided $$$ to hackers to DDoS; ineffective but lots of $$$  2014 – Disruption: data theft; Anonymous, protest to disrupted and embarrass; - Recon in network that to them are USA - relations between RU, China, Iran, N.K.; same code

18

19

20  Malicious actors go after those who have access to the data  Poor key implementation and management

21  Spear phishing  Social Engineering  Changing direct deposits  Downloading your emails  Humans can pivot and explore

22  What is the business goal?  What are the risks?  What are the threats?  What are the right security controls?

23

24 What they protect  Confidentiality  Integrity  Availability How they protect  Deter  Prevent  Detect  Recover  Reduce

25 We Live in Awesome Times Thank You


Download ppt "Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security."

Similar presentations


Ads by Google