SlideShare a Scribd company logo
1 of 49
Download to read offline
Control 
Quo*ent: 
Adap*ve 
Strategies 
For 
Gracefully 
Losing 
Control
Agenda 
Context 
The 
Control 
Quo*ent 
Today’s 
Reality 
Making 
it 
Personal 
Examples 
Transcending 
“Control” 
Apply
CONTEXT
Forces 
of 
Constant 
Change 
Evolving 
Threats 
BUSINESS 
COMPLEXITY 
= 
RISING 
COSTS 
Evolving 
Technologies 
Evolving 
Compliance 
Evolving 
Economics 
Evolving 
Business 
Needs
The 
IT 
Drunken 
Bender
The 
Control 
Con*nuum 
Dictator Surrender
Sphere 
of 
Control 
Control
Sphere 
of 
Influence 
vs. 
Control 
Influence 
Control
THE 
CONTROL 
QUOTIENT
The 
Control 
Quo*ent 
Defini*on 
• QuoGent: 
(from 
hOp://www.merriam-­‐webster.com/dic*onary/quo*ent 
) 
– the 
number 
resul*ng 
from 
the 
division 
of 
one 
number 
by 
another 
– the 
numerical 
ra*o 
usually 
mul*plied 
by 
100 
between 
a 
test 
score 
and 
a 
standard 
value 
– quota, 
share 
– the 
magnitude 
of 
a 
specified 
characterisGc 
or 
quality 
• Control 
QuoGent: 
opGmizaGon 
of 
a 
security 
control 
based 
on 
the 
maximum 
efficacy 
within 
sphere 
of 
control 
(or 
influence 
or 
trust) 
of 
the 
underlying 
infrastructure* 
• *unless 
there 
is 
an 
independent 
variable…
History 
• RSA 
Conference 
US 
2009 
P2P 
with 
@joshcorman 
– An 
endpoint 
has 
a 
comprehensive, 
but 
suspect, 
view 
– The 
network 
has 
a 
trustworthy, 
but 
incomplete, 
view
In 
Theory 
There 
Is 
An 
Op*mal 
Place 
to 
Deploy 
a 
Control… 
But 
Degrees 
Of 
Separa/on 
Happen….
Avoiding 
the 
Proverbial…
TODAY’S 
REALITY
Today’s 
Reality 
• Administra*ve 
control 
of 
en*re 
system 
is 
lost 
• Increased 
aOack 
surface 
• Abstrac*on 
has 
made 
systems 
difficult 
to 
assess 
• Expecta*on 
of 
any*me-­‐anywhere 
access 
from 
any 
device
The 
Control 
Quo*ent 
and 
the 
SPI 
Stack 
Security 
Management 
& 
GRC 
IdenGty/EnGty 
Security 
Data 
Security 
Host 
Network 
Infrastructure 
Security 
ApplicaGon 
Security 
CSA 
Cloud 
Model 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
The 
Control 
Quo*ent 
and 
the 
SPI 
Stack 
CSA 
Cloud 
Model 
Security 
Management 
& 
GRC 
IdenGty/EnGty 
Security 
Data 
Security 
Host 
Network 
Infrastructure 
Security 
ApplicaGon 
Security 
Virtualiza/on, 
So:ware 
Defined 
Networks, 
and 
Public/Hybrid/Community 
Cloud 
Forces 
a 
Change 
in 
How 
Security 
Controls 
Are 
Evaluated 
and 
Deployed
Half 
Full 
or 
Half 
Empty? 
To 
Be 
Successful, 
We 
Must 
Focus 
on 
the 
Control 
Kept 
(or 
Gained!), 
NOT 
the 
Control 
Lost…
Controls 
Gained!!! 
• Virtualiza*on 
and 
Cloud 
– Asset, 
Configura*on 
and 
Change 
Management 
– Snapshot 
– Rollback 
– Pause 
• VDI 
– Asset, 
Configura*on 
and 
Change 
Management 
• Mobility 
– Encryp*on 
(with 
containers) 
• Sogware-­‐As-­‐A-­‐Service 
– Logging!
MAKING 
IT 
PERSONAL
A 
Parent’s 
Most 
Valuable 
Asset?
A 
Parent’s 
Most 
Valuable 
Asset?
Most 
Valuable 
Asset? 
…Yet Most Parents Allow Their 
Kids to Leave Their Control
Choosing 
Child 
Care? 
NaGonal 
AssociaGon 
for 
the 
EducaGon 
of 
Young 
Children
EXAMPLES
Virtualiza*on 
and 
Cloud 
Created 
An 
En*re 
New 
Defini*on 
of 
Privilege
The 
Control 
Quo*ent 
and 
the 
SPI 
Stack 
Amazon EC2 - IaaS 
Salesforce - SaaS 
Google AppEngine - PaaS 
Stack 
by 
Chris 
Hoff 
-­‐> 
CSA 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue. 
“Stack” 
by 
Chris 
Hoff 
-­‐> 
CSA
The 
Control 
Quo*ent 
and 
the 
SPI 
Stack 
The lower down the stack the Cloud 
provider stops, the more security you 
are tactically responsible for 
implementing & managing yourself. 
Amazon EC2 - IaaS 
Salesforce - SaaS 
Google AppEngine - PaaS 
Stack 
by 
Chris 
Hoff 
-­‐> 
CSA 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue. 
“Stack” 
by 
Chris 
Hoff 
-­‐> 
CSA
So, 
Whose 
Cloud 
Is 
It 
Anyway? 
Model 
Private 
Cloud 
IaaS 
in 
Hybrid 
/ 
Community 
/ 
Public 
Cloud 
PaaS/SaaS 
Whose 
Privilege 
Users? 
Customer 
Provider 
Provider 
Whose 
Infrastructure? 
Customer 
Provider 
Provider 
Whose 
VM 
/ 
Instance? 
Customer 
Customer 
Provider 
Whose 
ApplicaGon? 
Customer 
Customer 
Provider 
Government 
Discovery 
Contact? 
Customer 
Provider 
Provider
More 
Than 
Just 
Technology… 
hOp://www.flickr.com/photos/markhillary/6342705495 
hOp://www.flickr.com/photos/tallentshow/2399373550
VDI: 
Centralizing 
the 
Desktop? 
VDI 
Server 
VDI Image 
Storage
Mobile 
hOp://www.flickr.com/photos/patrick-­‐allen/4318787860/
IoT 
/ 
Embedded 
Devices 
hOp://www.sodahead.com/fun/eight...blue-­‐screen.../ques*on-­‐2038989/CachedYou/?slide=2&page=4
Service 
Providers
Old 
Ways 
Don’t 
Work 
in 
New 
World… 
Most 
organiza/ons 
are 
trying 
to 
deploy 
“tradi/onal” 
security 
controls 
in 
cloud 
and 
virtual 
environments…but 
were 
the 
controls 
even 
effec/ve 
then?
TRANSCENDING 
“CONTROL”
A 
Modern 
Pantheon 
of 
Adversary 
Classes 
Actor 
Classes 
Script 
Kiddies 
Terrorists 
“HacGvists” 
Insiders 
Auditors 
Mo*va*ons 
States 
CompeGtors 
Organized 
Crime 
Financial 
Industrial 
Military 
Ideological 
PoliGcal 
PresGge 
Target 
Assets 
Intellectual 
Property 
PII 
/ 
IdenGty 
Methods 
Credit 
Card 
#s 
Web 
ProperGes 
“MetaSploit” 
DoS 
Phishing 
Rootkit 
SQLi 
Auth 
Cyber 
Infrastructure 
ExfiltraGon 
Core 
Business 
Processes 
Malware 
Physical 
Impacts 
ReputaGonal 
Personal 
ConfidenGality 
Integrity 
Availability 
Link 
to 
Full 
Adversary 
ROI 
Presenta.on 
Source: 
Adversary 
ROI: 
Why 
Spend 
$40B 
Developing 
It, 
When 
You 
Can 
Steal 
It 
for 
$1M? 
(RSA 
US 
2012) 
by 
Josh 
Corman 
and 
David 
Etue.
HD 
Moore’s 
Law 
and 
AOacker 
Power 
• Moore’s 
Law: 
Compute 
power 
doubles 
every 
18 
months 
• HDMoore’s 
Law: 
Casual 
AOacker 
Strength 
grows 
at 
the 
rate 
of 
MetaSploit 
Source: 
Joshua 
Corman, 
hOp://blog.cogni*vedissidents.com/2011/11/01/intro-­‐to-­‐hdmoores-­‐law/
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
ODpeSfeietrCnuaos*aui*obnonletnae 
Ilar 
nEml 
fxArecawaessatllrureuerncenctseeu 
s 
rse 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Opera*onal 
Excellence 
Defensible 
SitCuao*uonntearlm 
Infrastructure 
Aewaasruerneess 
s 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Situa*onal 
Awareness 
Opera*onal 
Excellence 
Defensible 
Countermeasures 
Infrastructure 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Countermeasures 
Situa*onal 
Awareness 
Opera*onal 
Excellence 
Defensible 
Infrastructure 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Control 
“Swim 
Lanes” 
Desired 
Leverage 
Points 
Outcomes 
PCI 
PHI 
“IP” 
Web 
AV 
FW 
IDS/IPS 
WAF 
Log 
Mngt 
File 
Integrity 
Disk 
Encryp*on 
Vulnerability 
Assessment 
Mul*-­‐Factor 
Auth 
An*-­‐SPAM 
VPN 
Web 
Filtering 
DLP 
Anomaly 
Detec*on 
Network 
Forensics 
Advanced 
Malware 
NG 
Firewall 
DB 
Security 
Patch 
Management 
SIEM 
An*-­‐DDoS 
An*-­‐Fraud 
… 
Compliance 
(1..n) 
Produc*vity 
“ROI” 
Breach 
/ 
QB 
sneak 
… 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Control 
& 
Influence 
“Swim 
Lanes” 
Desired 
Leverage 
Points 
Outcomes 
PCI 
PHI 
“IP” 
Web 
… 
AV 
FW 
IDS/IPS 
WAF 
Log 
Mngt 
File 
Integrity 
Disk 
Encryp*on 
Vulnerability 
Assessment 
Mul*-­‐Factor 
Auth 
An*-­‐SPAM 
VPN 
Web 
Filtering 
DLP 
Anomaly 
Detec*on 
Network 
Forensics 
Advanced 
Malware 
NG 
Firewall 
DB 
Security 
Patch 
Management 
SIEM 
An*-­‐DDoS 
An*-­‐Fraud 
… 
Compliance 
(1..n) 
Produc*vity 
DevOps 
“ROI” 
Breach 
/ 
QB 
sneak 
“Honest 
Risk” 
General 
Counsel 
Procurement 
Disrup*on 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Under-­‐tapped 
Researcher 
Influence 
Desired 
Leverage 
Points 
Outcomes 
PCI 
PHI 
“IP” 
Web 
… 
AV 
FW 
IDS/IPS 
WAF 
Log 
Mngt 
File 
Integrity 
Disk 
Encryp*on 
Vulnerability 
Assessment 
Mul*-­‐Factor 
Auth 
An*-­‐SPAM 
VPN 
Web 
Filtering 
DLP 
Anomaly 
Detec*on 
Network 
Forensics 
Advanced 
Malware 
NG 
Firewall 
DB 
Security 
Patch 
Management 
SIEM 
An*-­‐DDoS 
An*-­‐Fraud 
… 
Li*ga*on 
Legisla*on 
Open 
Source 
Hearts 
& 
Minds 
Academia 
Compliance 
(1..n) 
Produc*vity 
DevOps 
“ROI” 
Breach 
/ 
QB 
sneak 
“Honest 
Risk” 
General 
Counsel 
Procurement 
Disrup*on 
Source: 
Control 
Quo.ent: 
Adap.ve 
Strategies 
For 
Gracefully 
Losing 
Control 
(RSA 
US 
2013) 
by 
Josh 
Corman 
and 
David 
Etue.
Poten*al 
Independent 
Variables 
EncrypGon 
• with 
good 
key 
management… 
Rootkits 
• well, 
rootkits 
for 
good… 
Intermediary 
Clouds 
• AnG-­‐DDoS, 
WAF, 
Message/Content, 
IdenGty, 
etc… 
IdenGty 
and 
Access 
Management 
• with 
proper 
integraGon 
and 
process 
support 
Sofware-­‐As-­‐A-­‐Service 
(SaaS) 
• *if* 
the 
provider 
harnesses 
the 
opportunity
InfoSec 
Serenity 
Prayer 
Grant me the Serenity to accept the things I 
cannot change; 
Transparency to the things I cannot control; 
Relevant controls for the things I can; 
And the Wisdom (and influence) to mitigate 
risk appropriately.
Thank 
You! 
• TwiOer: 
@djetue 
• Resources: 
– Adversary 
ROI: 
• [SlideShare] 
• [RSA 
US 
2012 
Online 
on 
YouTube] 
– The 
Cyber 
Security 
Playbook: 
Securing 
Budget 
and 
Forming 
Allies 
(with 
@joshcorman) 
[BrightTALK]

More Related Content

Similar to Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...Amazon Web Services
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Conf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuConf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuSplunk
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityGeorg Knon
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data GovLoop
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Amazon Web Services
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfAmazon Web Services
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 

Similar to Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control (20)

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Conf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuConf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsu
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 

More from EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldEC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approachEC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinEC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoEC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderEC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019EC-Council
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerEC-Council
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementEC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...EC-Council
 

More from EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control

  • 1. Control Quo*ent: Adap*ve Strategies For Gracefully Losing Control
  • 2. Agenda Context The Control Quo*ent Today’s Reality Making it Personal Examples Transcending “Control” Apply
  • 4. Forces of Constant Change Evolving Threats BUSINESS COMPLEXITY = RISING COSTS Evolving Technologies Evolving Compliance Evolving Economics Evolving Business Needs
  • 5. The IT Drunken Bender
  • 6. The Control Con*nuum Dictator Surrender
  • 8. Sphere of Influence vs. Control Influence Control
  • 10. The Control Quo*ent Defini*on • QuoGent: (from hOp://www.merriam-­‐webster.com/dic*onary/quo*ent ) – the number resul*ng from the division of one number by another – the numerical ra*o usually mul*plied by 100 between a test score and a standard value – quota, share – the magnitude of a specified characterisGc or quality • Control QuoGent: opGmizaGon of a security control based on the maximum efficacy within sphere of control (or influence or trust) of the underlying infrastructure* • *unless there is an independent variable…
  • 11. History • RSA Conference US 2009 P2P with @joshcorman – An endpoint has a comprehensive, but suspect, view – The network has a trustworthy, but incomplete, view
  • 12. In Theory There Is An Op*mal Place to Deploy a Control… But Degrees Of Separa/on Happen….
  • 15. Today’s Reality • Administra*ve control of en*re system is lost • Increased aOack surface • Abstrac*on has made systems difficult to assess • Expecta*on of any*me-­‐anywhere access from any device
  • 16. The Control Quo*ent and the SPI Stack Security Management & GRC IdenGty/EnGty Security Data Security Host Network Infrastructure Security ApplicaGon Security CSA Cloud Model Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 17. The Control Quo*ent and the SPI Stack CSA Cloud Model Security Management & GRC IdenGty/EnGty Security Data Security Host Network Infrastructure Security ApplicaGon Security Virtualiza/on, So:ware Defined Networks, and Public/Hybrid/Community Cloud Forces a Change in How Security Controls Are Evaluated and Deployed
  • 18. Half Full or Half Empty? To Be Successful, We Must Focus on the Control Kept (or Gained!), NOT the Control Lost…
  • 19. Controls Gained!!! • Virtualiza*on and Cloud – Asset, Configura*on and Change Management – Snapshot – Rollback – Pause • VDI – Asset, Configura*on and Change Management • Mobility – Encryp*on (with containers) • Sogware-­‐As-­‐A-­‐Service – Logging!
  • 21. A Parent’s Most Valuable Asset?
  • 22. A Parent’s Most Valuable Asset?
  • 23. Most Valuable Asset? …Yet Most Parents Allow Their Kids to Leave Their Control
  • 24. Choosing Child Care? NaGonal AssociaGon for the EducaGon of Young Children
  • 26. Virtualiza*on and Cloud Created An En*re New Defini*on of Privilege
  • 27. The Control Quo*ent and the SPI Stack Amazon EC2 - IaaS Salesforce - SaaS Google AppEngine - PaaS Stack by Chris Hoff -­‐> CSA Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue. “Stack” by Chris Hoff -­‐> CSA
  • 28. The Control Quo*ent and the SPI Stack The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. Amazon EC2 - IaaS Salesforce - SaaS Google AppEngine - PaaS Stack by Chris Hoff -­‐> CSA Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue. “Stack” by Chris Hoff -­‐> CSA
  • 29. So, Whose Cloud Is It Anyway? Model Private Cloud IaaS in Hybrid / Community / Public Cloud PaaS/SaaS Whose Privilege Users? Customer Provider Provider Whose Infrastructure? Customer Provider Provider Whose VM / Instance? Customer Customer Provider Whose ApplicaGon? Customer Customer Provider Government Discovery Contact? Customer Provider Provider
  • 30. More Than Just Technology… hOp://www.flickr.com/photos/markhillary/6342705495 hOp://www.flickr.com/photos/tallentshow/2399373550
  • 31. VDI: Centralizing the Desktop? VDI Server VDI Image Storage
  • 33. IoT / Embedded Devices hOp://www.sodahead.com/fun/eight...blue-­‐screen.../ques*on-­‐2038989/CachedYou/?slide=2&page=4
  • 35. Old Ways Don’t Work in New World… Most organiza/ons are trying to deploy “tradi/onal” security controls in cloud and virtual environments…but were the controls even effec/ve then?
  • 37. A Modern Pantheon of Adversary Classes Actor Classes Script Kiddies Terrorists “HacGvists” Insiders Auditors Mo*va*ons States CompeGtors Organized Crime Financial Industrial Military Ideological PoliGcal PresGge Target Assets Intellectual Property PII / IdenGty Methods Credit Card #s Web ProperGes “MetaSploit” DoS Phishing Rootkit SQLi Auth Cyber Infrastructure ExfiltraGon Core Business Processes Malware Physical Impacts ReputaGonal Personal ConfidenGality Integrity Availability Link to Full Adversary ROI Presenta.on Source: Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M? (RSA US 2012) by Josh Corman and David Etue.
  • 38. HD Moore’s Law and AOacker Power • Moore’s Law: Compute power doubles every 18 months • HDMoore’s Law: Casual AOacker Strength grows at the rate of MetaSploit Source: Joshua Corman, hOp://blog.cogni*vedissidents.com/2011/11/01/intro-­‐to-­‐hdmoores-­‐law/
  • 39. Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 40. ODpeSfeietrCnuaos*aui*obnonletnae Ilar nEml fxArecawaessatllrureuerncenctseeu s rse Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 41. Opera*onal Excellence Defensible SitCuao*uonntearlm Infrastructure Aewaasruerneess s Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 42. Situa*onal Awareness Opera*onal Excellence Defensible Countermeasures Infrastructure Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 43. Countermeasures Situa*onal Awareness Opera*onal Excellence Defensible Infrastructure Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 44. Control “Swim Lanes” Desired Leverage Points Outcomes PCI PHI “IP” Web AV FW IDS/IPS WAF Log Mngt File Integrity Disk Encryp*on Vulnerability Assessment Mul*-­‐Factor Auth An*-­‐SPAM VPN Web Filtering DLP Anomaly Detec*on Network Forensics Advanced Malware NG Firewall DB Security Patch Management SIEM An*-­‐DDoS An*-­‐Fraud … Compliance (1..n) Produc*vity “ROI” Breach / QB sneak … Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 45. Control & Influence “Swim Lanes” Desired Leverage Points Outcomes PCI PHI “IP” Web … AV FW IDS/IPS WAF Log Mngt File Integrity Disk Encryp*on Vulnerability Assessment Mul*-­‐Factor Auth An*-­‐SPAM VPN Web Filtering DLP Anomaly Detec*on Network Forensics Advanced Malware NG Firewall DB Security Patch Management SIEM An*-­‐DDoS An*-­‐Fraud … Compliance (1..n) Produc*vity DevOps “ROI” Breach / QB sneak “Honest Risk” General Counsel Procurement Disrup*on Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 46. Under-­‐tapped Researcher Influence Desired Leverage Points Outcomes PCI PHI “IP” Web … AV FW IDS/IPS WAF Log Mngt File Integrity Disk Encryp*on Vulnerability Assessment Mul*-­‐Factor Auth An*-­‐SPAM VPN Web Filtering DLP Anomaly Detec*on Network Forensics Advanced Malware NG Firewall DB Security Patch Management SIEM An*-­‐DDoS An*-­‐Fraud … Li*ga*on Legisla*on Open Source Hearts & Minds Academia Compliance (1..n) Produc*vity DevOps “ROI” Breach / QB sneak “Honest Risk” General Counsel Procurement Disrup*on Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.
  • 47. Poten*al Independent Variables EncrypGon • with good key management… Rootkits • well, rootkits for good… Intermediary Clouds • AnG-­‐DDoS, WAF, Message/Content, IdenGty, etc… IdenGty and Access Management • with proper integraGon and process support Sofware-­‐As-­‐A-­‐Service (SaaS) • *if* the provider harnesses the opportunity
  • 48. InfoSec Serenity Prayer Grant me the Serenity to accept the things I cannot change; Transparency to the things I cannot control; Relevant controls for the things I can; And the Wisdom (and influence) to mitigate risk appropriately.
  • 49. Thank You! • TwiOer: @djetue • Resources: – Adversary ROI: • [SlideShare] • [RSA US 2012 Online on YouTube] – The Cyber Security Playbook: Securing Budget and Forming Allies (with @joshcorman) [BrightTALK]