• Like

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Uploaded on

Strong cryptography done correctly can’t be defeated! Wrong, a practical attack was published in 2009 against 10 round AES 256, quantum key distribution proved to be flawed in May 2010. You have to …

Strong cryptography done correctly can’t be defeated! Wrong, a practical attack was published in 2009 against 10 round AES 256, quantum key distribution proved to be flawed in May 2010. You have to have anti-virus! Well, fine, but it no longer works in a world that generates 30k new variations of malware some days. You should never have more than one service on a server. What about blades and virtualization? Data centers must have raised floors; funny, ours uses risers instead. If you are writing software, put all of your housekeeping such as getting file handles of input and opening scratch files in one function; because if those fail, your program will fail, and this way you can exit with a nice tidy error message. Of course, that introduces a number of TOC/TOU race conditions. If you are registering a domain name, be sure to also get the .net and .org ones to prevent people from using your brand. Okay, what about all the other domain extensions and country codes? The Blackberry is the only PDA that truly has enterprise class management tools and a securable configuration. Hmmm, we read about organizations switching to the iPhone all the time, Apple must have done something right.

I have been a security researcher for seventeen years and even though I spend a part of almost every week researching new stuff, I have to be aware that much of what used to be the basic blocking and tackling of information security just doesn’t work, isn’t relevant, or may even be dangerous today. This talk will not just be about what was once true and is no longer; it will be a discussion of how to lead when much of the information flow you are receiving is suspect, as well as where we appear to be heading in the future (and I will make every effort to avoid using the terms cloud and Advanced Persistent Threat.)

Stephen Northcutt, SANS Faculty Fellow

Stephen Northcutt founded the GIAC certification and currently serves as president of the SANS Technology Institute, a postgraduate level IT security college (www.sans.edu). Stephen is author/coauthor of Incident Handling Step-by-Step, Intrusion Signatures and Analysis, Inside Network Perimeter Security 2nd Edition, IT Ethics Handbook, SANS Security Essentials, SANS Security Leadership Essentials and Network Intrusion Detection 3rd edition. He was the original author of the Shadow Intrusion Detection system before accepting the position of chief for information warfare at the Ballistic Missile Defense Organization. Stephen is a graduate of Mary Washington College. Before entering the field of computer security, he worked as a Navy helicopter search and rescue crewman, white water raft guide, chef, martial arts instructor, cartographer, and network designer.

Since 2007 Stephen has conducted over 34 in-depth interviews with leaders in the security industry, from CEOs of security product companies to the most well-known practitioners in order to research the competencies required to be a successful leader in the security field. He maintains the SANS Leadership Laboratory, where research on these competencies is posted as well as SANS Security Musings. He is the lead author for ExecuBytes, a monthly newsletter that covers both technical and pragmatic information for security managers. He leads the Management 512 Alumni forum, where hundreds of security managers post questions. He is the lead author/instructor for Management 512: SANS Security Leadership Essentials for Managers, a prep course for the GSLC certification that meets all levels of requirements for DoD Security Managers per DoD 8570, and he also is the lead author/instructor for Management 421: SANS Leadership and Management Competencies. Stephen also blogs at the SANS Security Leadership blog.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
593
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
46
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Everything I know is wrong! How to lead a security team in a time of unprecedented change and challenge Management 512 – © 2010 SANS This is NOT a New Problem Management 512 – © 2010 SANS 1
  • 2. 1943: A world market for maybe five computers Management 512 – © 2010 SANS 1981: No one will ever need more than 640k Management 512 – © 2010 SANS 2
  • 3. 1995: Internet will never take off Management 512 – © 2010 SANS Some Specific Examples “A man doesn't know what he knows until he knows what he doesn't know.” Dr. Laurence Peters Management 512 – © 2010 SANS 3
  • 4. .pdfs are the safe attachment • Don’t send .docs that might transmit a virus, send a .pdf, it is “just” a print file • Today, about 1/2 of malware infections originate from Flash and Reader http://www.itpro.co.uk/622522/adobe-reader-and-ie-feel-brunt-of-web-based-malware • Doesn’t solve everything but I am loving Gpdf for Firefox and Chrome Management 512 – © 2010 SANS Computers are made from CPU, MMU and possibly GPU • Computers are made from a number of subsystems, many of which have own processor and memory that are not under direct control of OS • June 2010 Bigfoot released an NIC with its own GPU • And then, there is the baseboard management controller Management 512 – © 2010 SANS 4
  • 5. Hot site is the Cadillac of Disaster Recovery • Hot site means equipment/network is available and configured • However, today’s environments are so complex, that doesn’t work well; too many changes too fast. VMWare Site Recovery Manager has a much better chance of actually working. Management 512 – © 2010 SANS Or maybe alternate sites • Paul Volcker as the Fed, argued for redundant sites, database replication, geographic diversity • How geographically diverse? Think EMP http://www.newsmax.com/RonaldKessler/emp -electromagneticpulse-William-Graham/2010/04/05/id/354742 Management 512 – © 2010 SANS 5
  • 6. If you encrypt it with AES it will be safe for 1000 years • 2009, Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir, describe an attack against 10 round AES 256 that is fully practical • 14 rounds is NIST standard so don’t panic yet • Historical note, DES was still in common use when it could be cracked in near real time Management 512 – © 2010 SANS You have to have anti-virus • Is the prevailing wisdom and it has made its way to the auditor’s checklists • 30k new malware per day from automated systems, AV is 90% effective at best and usually far lower • What we have to have is endpoint white list technology, and it is a pain Management 512 – © 2010 SANS 6
  • 7. Incident Response isn’t that hard • In the past this was the domain of the Help desk and primary tool was a “cleaning kit” • Today, you find you need an outside specialist in response/forensics/ investigation/malware who bills at $330.00 hour door-to-door Management 512 – © 2010 SANS When you register a domain get the .net and .org as well • Yeah, and every country code and domain suffix? Management 512 – © 2010 SANS 7
  • 8. When you code, do all your housekeeping at one time • Get your file handles to input files, scratch files, output files all in the same function, so if you can’t do your I/O you exit with a nice error message • But, this allows a difference between TCO/TOU which opens the door for race conditions Management 512 – © 2010 SANS Online banking is safe because of security questions • It is likely that you mentioned the name of your pet on Facebook • They usually only ask the security questions if you do not have a bank cookie Management 512 – © 2010 SANS 8
  • 9. Online Banking Tips • eTrade uses an RSA dongle, therefore it is my primary account • Get your paycheck deposited into one bank account and do not use that account for ANYTHING other than paying bills • Have a max of one bank where you have a debit card Management 512 – © 2010 SANS As long as they don’t go to porn sites web surfing is harmless • Surfing the web is probably the most dangerous thing you do using a computer • NoScript Firefox, with Internet Explorer I have Flash disabled, try that and see how many web sites fail Management 512 – © 2010 SANS 9
  • 10. I run Microsoft Update so I am pretty good, yeah? • Actually, the odds are we have expired, end of life and out of date needing patches 3rd party applications • I run Secunia PSI 2.0+ to try to manage this Management 512 – © 2010 SANS You should never put more than one service on a server • This was one of the lessons of the Morris Worm – 1988, if the server goes down, you lose multiple services • Today, we have blades hosting hundreds of servers, however tools like VMotion may be able minimize the risk • State of Virginia went down for IT August 2010 for about a week Management 512 – © 2010 SANS 10
  • 11. OK, so what? Stephen, you have shared some facts, some I knew, some I didn’t, some I need to research further, but what is the point? Management 512 – © 2010 SANS Future Shock Revisited • 1970 – we are headed for a time of increasing change, people who can adapt will prosper, others . . . • Coined the term “information overload” which no one uses anymore even though they are overloaded • Concept of knowledge worker, who can work from anywhere (Aloha y’all) Management 512 – © 2010 SANS 11
  • 12. So, everything we know isn’t wrong, it is just changing Let’s talk about proven strategy to stay effective during times of change Management 512 – © 2010 SANS Business “clue” during times of extreme change • Situational awareness, get in the information stream, be alert for what you can measure • Know what is “evergreen”, adapting to continue to deliver revenue as times change and protect that above all • Don’t change anything that is working, save your energy for things that are not working well Management 512 – © 2010 SANS 12
  • 13. Security “clue” during times of extreme change • Threatpost • ISC.SANS.ORG – hey, it looks a lot more like English than it used to • SANS NewsBites • Scan Searchsecurity.techtarget.com • At least once a month, really dig into to a vulnerability or attack Management 512 – © 2010 SANS Don’t force yourself or your smart techie to try to figure it all out • Use templates for system configuration www.cisecurity.org • Leverage the 20 Critical Controls, especially the quick wins and automated controls Management 512 – © 2010 SANS 13
  • 14. Managing “across”, managing peers • Keep in mind that extreme change is and has been a fact of life in security for a long time, your peers in other areas of the business may not be as used to it as you are, give them some grace and time to adapt • Also, not everyone needs to be a technologist; a good business operator brings in more money than a technologist 99 times out of 100 Management 512 – © 2010 SANS Managing the Boss • Senior managers tend to be a little older and less flexible • Make sure to add value to the organization and then hold your ground *in private* • A compliment every once in a while doesn’t hurt • Practice giving accurate, but simple and short explanations about technology • Avoid FUD, that is so 1970s Management 512 – © 2010 SANS 14
  • 15. Managing Direct Reports • The two keys are capability and consistency, make sure the same boss shows up every day, push to improve capability • Communication – if something does not get done, first check to see if your direction was clear • Follow up, when you give direction set a calendar tickler Management 512 – © 2010 SANS Challenge Yourself • Meetings, whitepapers, policy are all important • But don’t get so busy that you don’t actually play with a tool every once in a while Management 512 – © 2010 SANS 15
  • 16. 12 Laws of IT Power • They can’t easily fire you if you are • No sensible organization the best wants to mess with a • Never speak to management in rainmaker hex • Avoid unplanned requests for • At any given time know what the money best selling security books are • Be positive • If you help people learn what you • Teaming, the person next to know, they will help you get the you knows something you work done don’t • Bet on people and bet large • Push back • Be flexible - as long as you have • When opportunity knocks, be oxygen, power, water and prepared to take advantage of propellant, you have options the moment Management 512 – © 2010 SANS Parting Thoughts • Nobody becomes effective or irrelevant in a day, either is the result of thousands of choices • We all have the same amount of time: avoid timewasters, seek timesavers, consider giving up a low value task to pursue a high value task • Decide what you want to accomplish, the steps to get there, share it with a friend who will hold you accountable, use written reminders until the steps become habits and then disciplines Management 512 – © 2010 SANS 16