SlideShare a Scribd company logo
1 of 39
Download to read offline
YOUR SPEAKER –
• 2014 HEAD OF INFORMATION SECURITY – WORLDLINE (ATOS GROUP)
• 2014 CISO LEVEL SECURITY, RISK & COMPLIANCE CONSULTANCY ACROSS EUROPE
• 2013 PCIDSS COMPLIANCE AT WALMART FOR ASDA & GEORGE (LEVEL ONE MERCHANT)
• 2011 - 2013 PCIDSS COMPLIANCE MANCHESTER AIRPORTS GROUP (LEVEL THREE MERCHANT)
• 2006-2011 PCIDSS COMPLIANCE HOMELOAN MANAGEMENT LIMITED (LEVEL ONE SERVICE PROVIDER)
• 2006 ECOMMERCE SECURITY– THOMAS COOK SCHEDULED BUSINESS
EXEC SUMMARY
• QUICK LOOK BACK OVER LAST TEN YEARS
• QUICK LOOK AT MY FAVOURITE BACKGROUND READING
• AT A FORK IN THE ROAD - KPI V SECVIZ
Looking Back…
35
INTRODUCTION (FROM 2003)
•IT SECURITY METRICS PROVIDE A PRACTICAL APPROACH TO MEASURING
INFORMATION SECURITY.
•EVALUATING SECURITY AT THE SYSTEM LEVEL, IT SECURITY METRICS ARE TOOLS THAT
FACILITATE DECISION MAKING AND ACCOUNTABILITY THROUGH COLLECTION,
ANALYSIS, AND REPORTING OF RELEVANT PERFORMANCE DATA.
34
OLD SCHOOL METRICS TUTORIAL
• DAN GEER
• 426 PAGES
• 2007
• GEER - HTTP://GEER.TINHO.NET/MEASURINGSECURITY.TUTORIAL.PDF
33
NIST SPECIAL PAPER
• NIST SP800 SERIES
• TECH STANDARDS
• US GOV
• 2008
32
CIS CONSENSUS ON IS METRICS
• HTTPS://BENCHMARKS.CISECURITY.ORG/DOWNLOADS/METRICS/
31
GOOD BOOKS
• THERE ARE PLENTY OF BOOKS OUT THERE – NEW ONES BEING PUBLISHED ALL THE TIME
• CAROLYN WONG -2011
• LANCE HAYDEN -2010
30
WWW.SANS.ORG READING ROOM
• FAVOURITE DASHBOARD PAPER
• 2010
29
SANS PAPER
• EXAMPLES
28
Know your enemy
27
HOW TO LIE WITH STATISTICS 1954
• DARRELL HUFF
26
HUFF HTLWS
• 2009
• AND NEW
• HTTP://CSEWEB.UCSD.EDU/~RICKO/CSE3/LIE_WITH_STATISTICS.PDF
25
24
BLACK HAT 2013 - TALK
• STEVE CHRISTIE
• BRIAN MARTIN
23
BLACK HAT TALK – UPDATE 2015
• HTTP://BLOG.OSVDB.ORG/CATEGORY/VULNERABILITY-STATISTICS/
22
Sample
21
Why Vulnerability Stats Suck
• Stats are presented without understanding the limits of the data
• Even if explanations are provided, correlation is confused with causation:
20
Talking Points
• Defining Bias
• Researcher Bias
• Vendor Bias
• VDB Bias
• Bad Stats
• Good(ish) Stats
• Conclusion
19
Disease Research:
Epidemiology vs. Vulnerability Research
Epidemiology Vulnerability Research
Goal Improve the public health
SAVE ALL THE THINGZ ON THA INTERWEBZ! *
(attention whoring)
Objects of Study People/Diseases Software/Vulnerabilities
Populations Groups of people
Groups of vulnerabilities (as seen in multi-vuln
disclosures)
Measurement
Devices (Tools of the
Trade)
Blood pressure monitors,
thermometers, lab tests, observation
Automated code scanners w/high FP/FN rates,
fuzzers, coffee-fueled malcontents staring at code at
3 AM
Publication
Requirements
Refereed journals with peer review Ability to send email
Sampling Methods
Using industry established
methodologies and formal
documentation.
Using wildly erratic methodologies, no standards for
documentation or disclosure
* Goal not shared by all researchers. Please to be rolling with this, kthxbye
18
The Shocking Claim
• Bias and statistics in vulnerability research are far worse than
it is in other disciplines
• At least people don’t die (yet?), but still use vulnerable
equipment:
– SCADA
– Airplanes
– Automobiles
– Medical Devices
– Oh my…
17
KPI / KRI
16
SECURITY EFFORT / PERFORMANCE
• WITH KRI
15
SECURITY EFFORT / PERFORMANCE
• WITH KPI
14
lets get visual
13
THE BOOKS
• APPLIEDSECURITY VISUALIZATION DATA-DRIVEN SECURITY
12
SECVIZ AND AFTERGLOW
• SITE WWW.SECVIZ.ORG AND TOOL AFTERGLOW (PERL)
11
DATA DRIVEN SECURITY BLOG/PODCAST
10
INDEPENDENT REVIEW OF DDS
• HTTP://HOLISTICINFOSEC.ORG/TOOLSMITH/PDF/SEPTEMBER2014.PDF
9
THE OTHER DATA DRIVEN SECURITY
• HTTPS://WWW.TRUSTWORTHYINTERNET.ORG/DATA-DRIVEN-SECURITY/
8
PATERVA MALTEGO TRANSFORM TOOL
• MALWAREINVESTIGATIONS EXAMPLES
2010 2013 2014
7
CROWDSTRIKE – DEEP PANDA
6
OPENDNS VIDEO AND GRAPHICS
• HTTPS://WWW.OPENDNS.COM/2013
• HTTPS://WWW.OPENDNS.COM/2014
5
OPENDNS FREE TOOLS
4
REALTIME MAPS – PURE MARKETING
• HTTP://CYBERMAP.KASPERSKY.COM/ HTTP://HTTP://MAP.IPVIKING.COM/
3
OTHER RT MAPS
• HTTP://WWW.THREATMETRIX.COM/THREATMETRIX-LABS/WEB-FRAUD-MAP/
• HTTP://WWW.FIREEYE.COM/CYBER-MAP/THREAT-MAP.HTML
• HTTP://WWW.DIGITALATTACKMAP.COM/#ANIM=1&COLOR=0&COUNTRY=ALL&TIME=16352&VIEW=MAP
• HTTP://WWW.SICHERHEITSTACHO.EU/
• HTTP://MASTDB3.MCAFEE.COM/VIRUSMAP3.ASP?NAME=VIRUSMAP&B=IE&LEFT=-162.96&BOTTOM=13.2&RIGHT=-
42.96&TOP=73.2&LANG=EN&OVB=2&FT=JPEG&OCM=1&VIEWBY=2&TRACK=4&PERIOD=1&CHOOSEMAP=1&CMD=ZOO
MIN
• HTTP://CERT.EUROPA.EU/BIGSCREENMAP/
2
THREATBUTT
• CYBER POMPEII
1
Time is precious, thank you for yours
https://uk.linkedin.com/in/jmck4cybersecurity

More Related Content

Viewers also liked

Introducing KRI model know your customers
Introducing KRI model   know your customersIntroducing KRI model   know your customers
Introducing KRI model know your customersBaby Sirota
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...NJVC, LLC
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Top 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTop 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTripwire
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIsH Contrex
 

Viewers also liked (10)

Introducing KRI model know your customers
Introducing KRI model   know your customersIntroducing KRI model   know your customers
Introducing KRI model know your customers
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
Key risk indicators shareslide
Key risk indicators shareslideKey risk indicators shareslide
Key risk indicators shareslide
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Top 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTop 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security Dashboard
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIs
 

Similar to Metrics evolution breakfast edition

Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...Yole Developpement
 
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...Sustainable Brands
 
MedDRA Coding - Katalyst HLS
MedDRA Coding - Katalyst HLSMedDRA Coding - Katalyst HLS
MedDRA Coding - Katalyst HLSKatalyst HLS
 
How to Assess New Technology - OMTEC 2017
How to Assess New Technology - OMTEC 2017How to Assess New Technology - OMTEC 2017
How to Assess New Technology - OMTEC 2017April Bright
 
Safety Culture Prerequisites Tool Aviation Academy
Safety Culture Prerequisites Tool Aviation AcademySafety Culture Prerequisites Tool Aviation Academy
Safety Culture Prerequisites Tool Aviation AcademySelma Piric
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
The Evolution of Predictive Analytics in Maaged Care
The Evolution of Predictive Analytics in Maaged CareThe Evolution of Predictive Analytics in Maaged Care
The Evolution of Predictive Analytics in Maaged CareAltegra Health
 
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)How The CPSC Identifies and Manages Risks Related to Consumer Products (English)
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)U.S. Consumer Product Safety Commission
 
A challenge of the sampling variance and note on the outlier treatment of EU ...
A challenge of the sampling variance and note on the outlier treatment of EU ...A challenge of the sampling variance and note on the outlier treatment of EU ...
A challenge of the sampling variance and note on the outlier treatment of EU ...ExternalEvents
 
Euromonitor Introduction 2011
Euromonitor Introduction 2011Euromonitor Introduction 2011
Euromonitor Introduction 2011aymang
 
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)Stratview Research
 
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...Yole Developpement
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...ARC Advisory Group
 
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...DheerajPawar4
 
Trust and security technologies: Lessons from the CRISP project
Trust and security technologies: Lessons from the CRISP projectTrust and security technologies: Lessons from the CRISP project
Trust and security technologies: Lessons from the CRISP projectTrilateral Research
 
Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?CRISP Project
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013Caveon Test Security
 

Similar to Metrics evolution breakfast edition (20)

Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2016 Report...
 
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...
Top Risks in Global Supply Chains: Primary-Source Intelligence and Recommenda...
 
MedDRA Coding - Katalyst HLS
MedDRA Coding - Katalyst HLSMedDRA Coding - Katalyst HLS
MedDRA Coding - Katalyst HLS
 
How to Assess New Technology - OMTEC 2017
How to Assess New Technology - OMTEC 2017How to Assess New Technology - OMTEC 2017
How to Assess New Technology - OMTEC 2017
 
Safety Culture Prerequisites Tool Aviation Academy
Safety Culture Prerequisites Tool Aviation AcademySafety Culture Prerequisites Tool Aviation Academy
Safety Culture Prerequisites Tool Aviation Academy
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
The Evolution of Predictive Analytics in Maaged Care
The Evolution of Predictive Analytics in Maaged CareThe Evolution of Predictive Analytics in Maaged Care
The Evolution of Predictive Analytics in Maaged Care
 
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)How The CPSC Identifies and Manages Risks Related to Consumer Products (English)
How The CPSC Identifies and Manages Risks Related to Consumer Products (English)
 
A challenge of the sampling variance and note on the outlier treatment of EU ...
A challenge of the sampling variance and note on the outlier treatment of EU ...A challenge of the sampling variance and note on the outlier treatment of EU ...
A challenge of the sampling variance and note on the outlier treatment of EU ...
 
MINDS-ON | Impact COVID19 on Clinical Trials
MINDS-ON | Impact COVID19 on Clinical TrialsMINDS-ON | Impact COVID19 on Clinical Trials
MINDS-ON | Impact COVID19 on Clinical Trials
 
Euromonitor Introduction 2011
Euromonitor Introduction 2011Euromonitor Introduction 2011
Euromonitor Introduction 2011
 
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)
Sepsis Diagnostics Market - Size, Share, Trend, and Forecast (2020-2025)
 
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...
Point-of-Need Testing: Application of Microfluidic Technologies - 2018 Report...
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
 
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
 
Trust and security technologies: Lessons from the CRISP project
Trust and security technologies: Lessons from the CRISP projectTrust and security technologies: Lessons from the CRISP project
Trust and security technologies: Lessons from the CRISP project
 
Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
 

More from James '​-- Mckinlay

40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AIJames '​-- Mckinlay
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsJames '​-- Mckinlay
 
Living with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI EditionLiving with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI EditionJames '​-- Mckinlay
 
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsJames '​-- Mckinlay
 
Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214James '​-- Mckinlay
 

More from James '​-- Mckinlay (11)

Cracking for the Blue Team
Cracking for the Blue TeamCracking for the Blue Team
Cracking for the Blue Team
 
Security at the speed of dev ops v3
Security at the speed of dev ops v3Security at the speed of dev ops v3
Security at the speed of dev ops v3
 
40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
cybersecurity-workforce-papers
cybersecurity-workforce-paperscybersecurity-workforce-papers
cybersecurity-workforce-papers
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Living with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI EditionLiving with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI Edition
 
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
 
Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214
 

Recently uploaded

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Metrics evolution breakfast edition

  • 1.
  • 2. YOUR SPEAKER – • 2014 HEAD OF INFORMATION SECURITY – WORLDLINE (ATOS GROUP) • 2014 CISO LEVEL SECURITY, RISK & COMPLIANCE CONSULTANCY ACROSS EUROPE • 2013 PCIDSS COMPLIANCE AT WALMART FOR ASDA & GEORGE (LEVEL ONE MERCHANT) • 2011 - 2013 PCIDSS COMPLIANCE MANCHESTER AIRPORTS GROUP (LEVEL THREE MERCHANT) • 2006-2011 PCIDSS COMPLIANCE HOMELOAN MANAGEMENT LIMITED (LEVEL ONE SERVICE PROVIDER) • 2006 ECOMMERCE SECURITY– THOMAS COOK SCHEDULED BUSINESS
  • 3. EXEC SUMMARY • QUICK LOOK BACK OVER LAST TEN YEARS • QUICK LOOK AT MY FAVOURITE BACKGROUND READING • AT A FORK IN THE ROAD - KPI V SECVIZ
  • 5. INTRODUCTION (FROM 2003) •IT SECURITY METRICS PROVIDE A PRACTICAL APPROACH TO MEASURING INFORMATION SECURITY. •EVALUATING SECURITY AT THE SYSTEM LEVEL, IT SECURITY METRICS ARE TOOLS THAT FACILITATE DECISION MAKING AND ACCOUNTABILITY THROUGH COLLECTION, ANALYSIS, AND REPORTING OF RELEVANT PERFORMANCE DATA. 34
  • 6. OLD SCHOOL METRICS TUTORIAL • DAN GEER • 426 PAGES • 2007 • GEER - HTTP://GEER.TINHO.NET/MEASURINGSECURITY.TUTORIAL.PDF 33
  • 7. NIST SPECIAL PAPER • NIST SP800 SERIES • TECH STANDARDS • US GOV • 2008 32
  • 8. CIS CONSENSUS ON IS METRICS • HTTPS://BENCHMARKS.CISECURITY.ORG/DOWNLOADS/METRICS/ 31
  • 9. GOOD BOOKS • THERE ARE PLENTY OF BOOKS OUT THERE – NEW ONES BEING PUBLISHED ALL THE TIME • CAROLYN WONG -2011 • LANCE HAYDEN -2010 30
  • 10. WWW.SANS.ORG READING ROOM • FAVOURITE DASHBOARD PAPER • 2010 29
  • 13. HOW TO LIE WITH STATISTICS 1954 • DARRELL HUFF 26
  • 14. HUFF HTLWS • 2009 • AND NEW • HTTP://CSEWEB.UCSD.EDU/~RICKO/CSE3/LIE_WITH_STATISTICS.PDF 25
  • 15. 24
  • 16. BLACK HAT 2013 - TALK • STEVE CHRISTIE • BRIAN MARTIN 23
  • 17. BLACK HAT TALK – UPDATE 2015 • HTTP://BLOG.OSVDB.ORG/CATEGORY/VULNERABILITY-STATISTICS/ 22
  • 19. Why Vulnerability Stats Suck • Stats are presented without understanding the limits of the data • Even if explanations are provided, correlation is confused with causation: 20
  • 20. Talking Points • Defining Bias • Researcher Bias • Vendor Bias • VDB Bias • Bad Stats • Good(ish) Stats • Conclusion 19
  • 21. Disease Research: Epidemiology vs. Vulnerability Research Epidemiology Vulnerability Research Goal Improve the public health SAVE ALL THE THINGZ ON THA INTERWEBZ! * (attention whoring) Objects of Study People/Diseases Software/Vulnerabilities Populations Groups of people Groups of vulnerabilities (as seen in multi-vuln disclosures) Measurement Devices (Tools of the Trade) Blood pressure monitors, thermometers, lab tests, observation Automated code scanners w/high FP/FN rates, fuzzers, coffee-fueled malcontents staring at code at 3 AM Publication Requirements Refereed journals with peer review Ability to send email Sampling Methods Using industry established methodologies and formal documentation. Using wildly erratic methodologies, no standards for documentation or disclosure * Goal not shared by all researchers. Please to be rolling with this, kthxbye 18
  • 22. The Shocking Claim • Bias and statistics in vulnerability research are far worse than it is in other disciplines • At least people don’t die (yet?), but still use vulnerable equipment: – SCADA – Airplanes – Automobiles – Medical Devices – Oh my… 17
  • 24. SECURITY EFFORT / PERFORMANCE • WITH KRI 15
  • 25. SECURITY EFFORT / PERFORMANCE • WITH KPI 14
  • 27. THE BOOKS • APPLIEDSECURITY VISUALIZATION DATA-DRIVEN SECURITY 12
  • 28. SECVIZ AND AFTERGLOW • SITE WWW.SECVIZ.ORG AND TOOL AFTERGLOW (PERL) 11
  • 29. DATA DRIVEN SECURITY BLOG/PODCAST 10
  • 30. INDEPENDENT REVIEW OF DDS • HTTP://HOLISTICINFOSEC.ORG/TOOLSMITH/PDF/SEPTEMBER2014.PDF 9
  • 31. THE OTHER DATA DRIVEN SECURITY • HTTPS://WWW.TRUSTWORTHYINTERNET.ORG/DATA-DRIVEN-SECURITY/ 8
  • 32. PATERVA MALTEGO TRANSFORM TOOL • MALWAREINVESTIGATIONS EXAMPLES 2010 2013 2014 7
  • 34. OPENDNS VIDEO AND GRAPHICS • HTTPS://WWW.OPENDNS.COM/2013 • HTTPS://WWW.OPENDNS.COM/2014 5
  • 36. REALTIME MAPS – PURE MARKETING • HTTP://CYBERMAP.KASPERSKY.COM/ HTTP://HTTP://MAP.IPVIKING.COM/ 3
  • 37. OTHER RT MAPS • HTTP://WWW.THREATMETRIX.COM/THREATMETRIX-LABS/WEB-FRAUD-MAP/ • HTTP://WWW.FIREEYE.COM/CYBER-MAP/THREAT-MAP.HTML • HTTP://WWW.DIGITALATTACKMAP.COM/#ANIM=1&COLOR=0&COUNTRY=ALL&TIME=16352&VIEW=MAP • HTTP://WWW.SICHERHEITSTACHO.EU/ • HTTP://MASTDB3.MCAFEE.COM/VIRUSMAP3.ASP?NAME=VIRUSMAP&B=IE&LEFT=-162.96&BOTTOM=13.2&RIGHT=- 42.96&TOP=73.2&LANG=EN&OVB=2&FT=JPEG&OCM=1&VIEWBY=2&TRACK=4&PERIOD=1&CHOOSEMAP=1&CMD=ZOO MIN • HTTP://CERT.EUROPA.EU/BIGSCREENMAP/ 2
  • 39. Time is precious, thank you for yours https://uk.linkedin.com/in/jmck4cybersecurity