Welcome to the blue team! How building a better hacker accidentally built a better defender.
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Welcome to the blue team! How building a better hacker accidentally built a better defender.

  • 305 views
Uploaded on

Security practitioners know that the threats that face an organization are always active, and that while defenders need to get everything right, a good attacker only needs to get one thing right.......

Security practitioners know that the threats that face an organization are always active, and that while defenders need to get everything right, a good attacker only needs to get one thing right. That’s all well and good for security practitioners, but what about the rest of the company? How do you transform security from a rather inconvenient checklist, to a nascent awareness of the threat? How do you get those responsible for providing your attack surface to ‘actually care about whether it’s secure or not?

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
305
On Slideshare
305
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
9
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Welcome to the blue team… 
 (How building a better hacker accidentally built a better defender) Casey Ellis - Converge Detroit 2014
  • 2. About me @caseyjohnellis JABAH (Just Another Blonde Aussie Hacker) Recovering pentester turned solution architect turned sales guy turned entrepreneur Wife and two kids now living in San Francisco Founder and CEO of Bugcrowd
  • 3. Before we begin… • I’m not here to sell you anything. • Let’s be real. • I’m not a developer. I’m a 100% breaker. So I’m speaking to security folks in front of developers. This will hopefully help all of you.
  • 4. Who’s who • Who here builds for a living? • Who here breaks for a living? • Who does both? Seriously? You poor bugger.
  • 5. You’re different. Very different actually… 
 and we don’t want to change that. Builders Breakers
  • 6. Say what?
  • 7. You’re paid to do completely the opposite things.
  • 8. Developer Incentive Push this feature by this 
 deadline because $REASON.
  • 9. Security Incentive Make sure dev doesn’t do anything " that lets the bad guys in.
  • 10. Side note: • Those who think like bad guys *greatly* overestimate the ability for everyone else to think like a bad guy. • Doesn’t make security people “better”. Does make us useful (and really, really annoying). • Tip: The next time you feel like calling a developer “dumb”, build and launch a product first.
  • 11. Developer Problem All this security shit 
 slows us down
  • 12. Security Problem Why won’t they take " me seriously?
  • 13. Side note: • Development contributes to products which make money. No dev = no product = no money = no job = no beuno. • Security minimizes risk of loss. No security = More risk… but *maybe* nothing will happen. • This driver for prioritization happens all. the. time.
  • 14. The real developer problem I don’t believe in 
 the boogeyman
  • 15. The real security problem I don’t have the time/energy/people skills/resources " to convince you that the boogeyman is real.
  • 16. Side note: • Thanks to every security vendor ever for making this even harder. • FUD works, but FUD fatigue is real.
  • 17. Status quo • Developer checklists • Check-in testing/CI tests • Security awareness training • Pentesting/VA/outsourced things BLOCKERS
  • 18. So we do this… (and let’s be honest, we quite enjoy it too…)
  • 19. It doesn’t work over the long term.
  • 20. How do we get developers to believe in the boogeyman?
  • 21. Boogeyman awareness > Annoying checklist
  • 22. Pickard Management Tip
  • 23. The McAfee Version The most security aware an organization will ever be is straight after a breach. *not a John McAfee quote, but he’s burning benjamin’s in this pic because it’s true.
  • 24. That’s nice, but how do I avoid the whole “getting pwned” bit?
  • 25. Bug bounty!!!
  • 26. FOREVER!!! Pics from @alliebrosh http://hyperboleandahalf.blogspot.com/2010/06/this-is-why-ill-never-be-adult.html
  • 27. What’s a bug bounty program?
  • 28. History 0 125 250 375 500 1995 2000 2005 2010 2015
  • 29. It’s not just about being cheap, or loud…
  • 30. It’s about leveling the playing field…
  • 31. …and about introducing your devs to this guy. Egor Homakov (@homakov) aka “that guy who totally owned Github that time” ! Good guy who thinks like a bad guy ! “I wonder what his next-door neighbor can do?”
  • 32. Bug bounties create controlled incidents…
  • 33. … like having your code owned by an 18yo kid.
  • 34. Mozilla Thanks to @mwcoates http://www.slideshare.net/michael_coates/bug-bounty-programs-for-the-web
  • 35. Two other “non-slide” examples
  • 36. An idea: Gamify your SDLC • Create a pot that benefits your dev team (team drinks, party, event, whatever) and have bug bounties paid from it. What ever the hackers don’t get, the devs keep. • Level up: Pilot it with internal teams.
  • 37. Ready to start?
  • 38. Bug bounties are awesome…
  • 39. …but hard.
  • 40. The Golden Rule: ! Touch the code == reward the bug
  • 41. The mistake *everyone* makes: ! VULNERABILITY DATA PEOPLE
  • 42. Conclusion • Bug bounties are cost effective, and highly marketable… but that’s not the full story… • …the psychology of external disclosure is completely different to internal security training, and it’s extremely effective. • Go start one. • More tips and tricks at https://blog.bugcrowd.com
  • 43. Questions?
  • 44. @caseyjohnellis https://bugcrowd.com casey@bugcrowd.com ! Greets to Wolf, @jimmyvo and Converge crew, builditsecure.ly, Rapid7, iamthecavalry.com, @treyford, @quine, @markstanislav, @alliebrosh, @mwcoates, @homakov, @codesoda and the @bugcrowd team.