SlideShare a Scribd company logo
1 of 37
Running with Scissors
Security Hurts No Matter What
• Certified CISO
• Sold First Software Package in 1971
• Debugged UBASIC for FAU/FIU in 1973
• Member of FreeBSD Development Team
• Finalist EE Times Innovator of the Year
• Holder, US Patent Number 7603711
• Founded Florida Datamation in 1982
– Largest QNX Distributor in the World
– Clients: NSA, VISA, Nortel, SAIC, NOAA, DOD, IBM, 3Com, HP
• Founded SECNAP Network Security in 2001
– Designed IT Risk and Compliance Audit Practice
– Developed and Patented SECNAP’s ID/PS Appliance, core of MSSP Practice
– Clients: SAP, Bank United, City National Bank
• Founded Security Privateers in 2012
Michael Scheidell, CISO
Security Privateers
Agenda
Running with Scissors
Massive Security Breaches
Failed Policies
Good Security Enhances Privacy
Change the way you think
Core Problems
Support Industry Initiatives
Take responsibility
Security and Privacy Success ?
Running With Scissors
Where else except in Security and Weather can you be
wrong so many times and still keep your job?
Running with Scissors
Running with Scissors: Down
Budget cuts reduce security
Systems hacked
Customer data lost
Unauthorized bank transfers
Identify theft
Industrial espionage
Focused on the wrong objectives
Sony: #1 Again 77 million play station network users
Sega: Striving to be #2: 1.3 Million online gaming subscribers
Epsilon: 60 Million customer’s data breached
South Carolina Department of Revenue: 6.8 Million tax payers
Running With Scissors
Massive Security Breaches
1
2
3
4
5
RSA: Everyone who used RSA key fobs
Running With Scissors
•Most talked about security and privacy failures
•Simple security mistakes, programming, carelessness
•When too much security caused failures?
•You can’t have privacy without security
•But, you CAN have security without privacy
Failed Policies
South Carolina Department of Revenue, 6.8 Million Tax payers
 Looking for a CISO for over a year
 Could not find qualified candidate for $100K job
 Programmers didn’t follow best practices
 Network Administrator violated policies
 No one tested the application
 Dog ate my homework
Running with Scissors
Running with Scissors: UP
Spending Too much on Security
Money is wasted
No measurable effect
Ineffective
Focused on the wrong objectives
Running With Scissors
What major systemic failure can you think of
in Security and Privacy?
Where has too much Security eliminated
Privacy and did nothing for Security?
Have you experienced too much security?
Good Security Enhances Privacy
EU Data Privacy laws vs. US Data Protection
Security Without Privacy
$8 Billion Dollar Budget in 2012
$88 Billion Dollars since 2001
• Mission: The TSA protects the nation’s
transportation systems to ensure freedom
of movement for people and commerce
• Vision: Continuously set the standard for
excellence in transportation security
through its people, processes, and
technology
Failed Policies?
TSA: Mission, Vision, Core Values
Security Without Privacy
$80 Million, and now $245 Million
Enhanced Security
What did the TSA Find?
Enhanced Security
What did the TSA Find?
Enhanced Security
What did the TSA Find?
Show of hands: Who feels more Secure?PART
TWO – YES/NO
Less Secure ?
Running with Scissors
Core Problems
• More Hardware?
• More People?
• Better Processes?
• Hire a CISO for $100K a year?
• Change Mission Statement?
• Training?
How do you fix it?
3D SLIDE MAN – EMOTIONS PART TWO – YES/NO
Block The Hackers
What do we Really Need?
Full Speed Ahead!
Don’t Touch Anything
Anything
Lets just Wait and See
Educate the Board
APT, SQL Injection, Cross Site Scripting,
Split Tunnel, VPN, WPA2, SSL v2, TLS v1,
SDN, SaaS, PaaS, IaaS
What do we Really Need?
CEO
What do we Really Need?
CISO
CISO Responsibilities
• Policies
• Guidelines
• Directives
• Procedures
• Standards
Balance Sheet, CAPX, Derivatives, GAAP, IFRS,
FASB, FIN, EBIDA
What do we Really Need?
CISO
What the CISO needs to know
What do we Really Need?
CEO
• Vision
• Mission
• Objectives
• Goals
• Strategies
• Results
Isolated and conflicting responsibilities
Executive Management Team
Financial Management Team
CEO
Network Engineers
Security Engineers
SEEMINLY CONFLICTING
CEO vs CISO
Budget vs Privacy
Spend vs Invest
Expand vs Secure
CISO
Decision Time: Who is Responsible?
Who has Authority ?TWO – YES/NO
3D SLIDE MAN – EMOTIONS PART TWO – YES/NO
Not My Job
CEO is responsible for final decision
What do we really need?
CEO, CFO, CIO, CSO must agree
It is the
CIO/CFO/CTO/CSO’s
fault
What if we don’t agree?
Ultimately responsible
Example text
Go ahead and replace it with your own text. This is an
example text. Go ahead and replace it with your own text.
Go ahead and replace it with your own text
Network Engineer
Just trying to pay the
mortgage and visa bill
CISO
Reports to CIO
400K budget
CIO/CTO
Reports to CEO
3MM budget
CEO/President
Reports to Board &
Shareholders
13MM budget
What do we really need?
Running with Scissors
Keep the Main Thing The Main Thing
A successful organization understands the risks of
not only implementing security and privacy measures,
but the risks of NOT implementing them. Running
with Scissors: “Its what we do”
Keep Plenty of
Bandaids.
Put Running
Shoes on.
Keep Scissors
Sharp.
• Cloud Security Alliance (CSA)
• Information Systems Audit and Control
Association (ISACA)
• Information Systems Security Association
(ISSA)
• FBI’s InfraGard
• Host users groups meetings
Support Industry Initiatives
Users Groups, Trade Groups, Share Information
Involve Everyone:
•Business case & Budget
•Contractual agreement
•Vision
•Initial product backlog
•Initial release plan
•Stakeholderbuy-in
•Assemble team
PREPARATION
SCRUM PROCESS
CTO
CEO/President
Stakeholders
Sprint planning
meeting Daily Cycle
Sprint review
Sprint
retrospective
Update
product
backlog
RELEASE
Product
increment
CIO and
CSO
Users
CEO/CFO:
Lets move everything to the cloud.
We save on Capex, its more secure
and gives us reduncancy. We don’t
care if its Amazon, Oracle or HP
Everyone is
Happy
Company is secure, privacy maintained
CEO CFO
CTOCSO Programmers Users
CIO
CEO Happy: Board of Directors
Happy, got his 2MM bonus
1
CFO Happy: Reduced Operating Expense
No CAP Ex, Reduced Overhead
2
CIO Happy: CEO give him his bonus
3
Users Happy: More services, faster
user interface, reduced costs.
4
If it works: Name your bonus
THANK YOU!
Michael Scheidell, Managing Director, CISO
Security Privateers
www.securityprivateers.com
+1.561.948.1305 / michael@securityprivateers.com
Copyright 2013, Security Privateers
Portions Copyright Ron Leishman

More Related Content

What's hot

Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
Conferencias FIST
 

What's hot (20)

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and Rewards
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Helping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threatsHelping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threats
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 years
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...
 
Witt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama PanalWitt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama Panal
 

Similar to Running with Scissors: Balance between business and InfoSec needs

Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
ClubHack
 

Similar to Running with Scissors: Balance between business and InfoSec needs (20)

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

More from Michael Scheidell

More from Michael Scheidell (6)

Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting Secrets
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Recently uploaded (20)

JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 

Running with Scissors: Balance between business and InfoSec needs

  • 1. Running with Scissors Security Hurts No Matter What
  • 2. • Certified CISO • Sold First Software Package in 1971 • Debugged UBASIC for FAU/FIU in 1973 • Member of FreeBSD Development Team • Finalist EE Times Innovator of the Year • Holder, US Patent Number 7603711 • Founded Florida Datamation in 1982 – Largest QNX Distributor in the World – Clients: NSA, VISA, Nortel, SAIC, NOAA, DOD, IBM, 3Com, HP • Founded SECNAP Network Security in 2001 – Designed IT Risk and Compliance Audit Practice – Developed and Patented SECNAP’s ID/PS Appliance, core of MSSP Practice – Clients: SAP, Bank United, City National Bank • Founded Security Privateers in 2012 Michael Scheidell, CISO Security Privateers
  • 3. Agenda Running with Scissors Massive Security Breaches Failed Policies Good Security Enhances Privacy Change the way you think Core Problems Support Industry Initiatives Take responsibility
  • 4. Security and Privacy Success ? Running With Scissors Where else except in Security and Weather can you be wrong so many times and still keep your job?
  • 5. Running with Scissors Running with Scissors: Down Budget cuts reduce security Systems hacked Customer data lost Unauthorized bank transfers Identify theft Industrial espionage Focused on the wrong objectives
  • 6. Sony: #1 Again 77 million play station network users Sega: Striving to be #2: 1.3 Million online gaming subscribers Epsilon: 60 Million customer’s data breached South Carolina Department of Revenue: 6.8 Million tax payers Running With Scissors Massive Security Breaches 1 2 3 4 5 RSA: Everyone who used RSA key fobs
  • 7. Running With Scissors •Most talked about security and privacy failures •Simple security mistakes, programming, carelessness •When too much security caused failures? •You can’t have privacy without security •But, you CAN have security without privacy Failed Policies
  • 8. South Carolina Department of Revenue, 6.8 Million Tax payers  Looking for a CISO for over a year  Could not find qualified candidate for $100K job  Programmers didn’t follow best practices  Network Administrator violated policies  No one tested the application  Dog ate my homework
  • 9. Running with Scissors Running with Scissors: UP Spending Too much on Security Money is wasted No measurable effect Ineffective Focused on the wrong objectives
  • 10. Running With Scissors What major systemic failure can you think of in Security and Privacy? Where has too much Security eliminated Privacy and did nothing for Security? Have you experienced too much security? Good Security Enhances Privacy EU Data Privacy laws vs. US Data Protection
  • 11. Security Without Privacy $8 Billion Dollar Budget in 2012 $88 Billion Dollars since 2001
  • 12. • Mission: The TSA protects the nation’s transportation systems to ensure freedom of movement for people and commerce • Vision: Continuously set the standard for excellence in transportation security through its people, processes, and technology Failed Policies? TSA: Mission, Vision, Core Values
  • 13. Security Without Privacy $80 Million, and now $245 Million
  • 14. Enhanced Security What did the TSA Find?
  • 15. Enhanced Security What did the TSA Find?
  • 16. Enhanced Security What did the TSA Find?
  • 17. Show of hands: Who feels more Secure?PART TWO – YES/NO
  • 19. Running with Scissors Core Problems • More Hardware? • More People? • Better Processes? • Hire a CISO for $100K a year? • Change Mission Statement? • Training? How do you fix it?
  • 20. 3D SLIDE MAN – EMOTIONS PART TWO – YES/NO Block The Hackers What do we Really Need? Full Speed Ahead! Don’t Touch Anything Anything Lets just Wait and See
  • 21. Educate the Board APT, SQL Injection, Cross Site Scripting, Split Tunnel, VPN, WPA2, SSL v2, TLS v1, SDN, SaaS, PaaS, IaaS What do we Really Need? CEO
  • 22. What do we Really Need? CISO CISO Responsibilities • Policies • Guidelines • Directives • Procedures • Standards
  • 23. Balance Sheet, CAPX, Derivatives, GAAP, IFRS, FASB, FIN, EBIDA What do we Really Need? CISO What the CISO needs to know
  • 24. What do we Really Need? CEO • Vision • Mission • Objectives • Goals • Strategies • Results
  • 25. Isolated and conflicting responsibilities Executive Management Team Financial Management Team CEO Network Engineers Security Engineers SEEMINLY CONFLICTING CEO vs CISO Budget vs Privacy Spend vs Invest Expand vs Secure CISO
  • 26. Decision Time: Who is Responsible? Who has Authority ?TWO – YES/NO
  • 27. 3D SLIDE MAN – EMOTIONS PART TWO – YES/NO Not My Job
  • 28. CEO is responsible for final decision What do we really need? CEO, CFO, CIO, CSO must agree
  • 30. Ultimately responsible Example text Go ahead and replace it with your own text. This is an example text. Go ahead and replace it with your own text. Go ahead and replace it with your own text Network Engineer Just trying to pay the mortgage and visa bill CISO Reports to CIO 400K budget CIO/CTO Reports to CEO 3MM budget CEO/President Reports to Board & Shareholders 13MM budget
  • 31. What do we really need?
  • 32. Running with Scissors Keep the Main Thing The Main Thing A successful organization understands the risks of not only implementing security and privacy measures, but the risks of NOT implementing them. Running with Scissors: “Its what we do” Keep Plenty of Bandaids. Put Running Shoes on. Keep Scissors Sharp.
  • 33. • Cloud Security Alliance (CSA) • Information Systems Audit and Control Association (ISACA) • Information Systems Security Association (ISSA) • FBI’s InfraGard • Host users groups meetings Support Industry Initiatives Users Groups, Trade Groups, Share Information
  • 34. Involve Everyone: •Business case & Budget •Contractual agreement •Vision •Initial product backlog •Initial release plan •Stakeholderbuy-in •Assemble team PREPARATION SCRUM PROCESS CTO CEO/President Stakeholders Sprint planning meeting Daily Cycle Sprint review Sprint retrospective Update product backlog RELEASE Product increment CIO and CSO Users CEO/CFO: Lets move everything to the cloud. We save on Capex, its more secure and gives us reduncancy. We don’t care if its Amazon, Oracle or HP
  • 35. Everyone is Happy Company is secure, privacy maintained CEO CFO CTOCSO Programmers Users CIO
  • 36. CEO Happy: Board of Directors Happy, got his 2MM bonus 1 CFO Happy: Reduced Operating Expense No CAP Ex, Reduced Overhead 2 CIO Happy: CEO give him his bonus 3 Users Happy: More services, faster user interface, reduced costs. 4 If it works: Name your bonus
  • 37. THANK YOU! Michael Scheidell, Managing Director, CISO Security Privateers www.securityprivateers.com +1.561.948.1305 / michael@securityprivateers.com Copyright 2013, Security Privateers Portions Copyright Ron Leishman