SlideShare a Scribd company logo
1 of 16
LONDON 2015Join the conversation #devseccon
DevSecOps - The 道 of
Security Science
Scott C. Kennedy - Security Scientist
Cloud Security Team - Intuit
What is Tao? 道?
• Not a ‘name for a ‘thing’
• An underlying natural order of the universe
• Hard to grasp, easy to see.
• 道 = Radical 辶 (go forward/walk/walking)
+ 首 (head)
• Loosely understood as a concept of…
• A road, way, path, or route
• The way one goes somewhere
• Or a doctrine, principle
• The way one does or believes something
All quotes used in this text box are from The Complete Tao Te Ching
Translated by Gia-fu Feng and Jane English, Vintage Books, 1989
Examples of Tao
• ‘Nature does not hurry, yet everything is
accomplished.’ - Lao Tzu
• What does that mean?
• It’s like growing older
• Everyone does it.
• It’s hard to understand how it happens
• Yet it feels natural
3
“In dealing with others, be gentle and kind. In speech, be true. In ruling, be just. In
daily life, be competent. In action, be aware of the time and the season. No fight:
No blame. ” - Tao Te Ching (chapter 48)
How to relate to IT/Security?
“The world is ruled by letting things take their course, it cannot be ruled by
interfering.” - Tao Te Ching (chapter 48)
Which works better? DevSecOps
“Nothing is more soft and yielding than water, yet for attacking the solid and the
strong, nothing is better.” - Tao Te Ching (chapter 78)
The Innovation Race
Security: did you see
something fly by?
Security: if only
they’d engage us
sooner…
Sigh…by the time I
get to the finish
line, I have to start
all over again
Hope nothing
catches up with
us…
“The softest thing in the universe, Overcomes the hardest thing in the universe.” -
Tao Te Ching (chapter 43)
The Arts/Wushu of DevSecOps
DevSecOps
Security
Engineering
Experiment,
Automate,
Test
Security
Operations
Hunt, Detect,
Contain
Compliance
Operations
Respond,
Manage, Train
Security
Science
Learn,
Measure,
Forecast
“Empty yourself of everything. Let the mind become still. The ten thousand things
rise and fall while the Self watches their return. They grow and flourish and then
return to the source.” - Tao Te Ching (chapter 78)
Security Science?
• From F.U.D. to facts
• Science is a fact-based examination
• Theories established
• Testable against real data
• Revised and retested as the landscape
changes…
• Question -> Hypotheses -> Experiment ->
Analyze -> Repeat
• Answers simple questions
“Knowing ignorance is strength; ignoring knowledge is sickness.” - Tao Te Ching
(chapter 71)
Examples of Security Science
• What is your Password policy?
• With an attacker with a budget of $10,000, we ought to
set our minimum length to 12 characters if we rotate
our passwords every 90 days.
• How frequently do you need to patch/restack?
• With the Amazon RHEL image, it’s every 5.3 days.
• With our base RHEL image, it’s 10.5 days.
• Minimum Length of password vs. algorithm used?
• MD-5 = 19 characters
• SHA-512 = 11 characters
• Bcrypt = 8 characters
“The truly great man dwells on what is real and not what is on the surface.” - Tao
Te Ching (chapter 38)
How to start Security Science?
• Look at your company.
• What questions need answers?
• Theorize a solution
• How do you think to solve this?
• Gather data to investigate.
• What sources do you need?
• What are you missing? How to get it?
• Analyze data to confirm/dispute
• Was your assumption, correct?
“Perseverance is a sign of will power. He who stays where he is endures.” - Tao Te
Ching (chapter 33)
We keep getting
Phished!
Can Training
Help?
Server Logs Phish
Users
Did Phish training
reduce phishing
success?
Phishing ourselves taught us…
• We phished our own security team at Intuit.
• Had a very well crafted phish to mimic internal
processes
• Achieved a 54% click through rate
• Women are 25% more likely than men to click
• 1/3 tested will click on a link, access a site and
enter details even when they suspect it is
suspicious
• Existing security awareness/phishing training
campaigns did not prevent this
“In caring for others and serving heaven, There is nothing like using restraint.
Restraint begins with giving up one's own ideas.” - Tao Te Ching (chapter 59)
Where can we use more Science?
“Knowing others is wisdom; Knowing the self is enlightenment. Mastering others
requires force; Mastering the self needs strength. He who knows he has enough is
rich. ” - Tao Te Ching (chapter 33)
Ways to “move the needle”
• Scoring/Grades are powerful motivators
• Allows the Dev leader to drill down to answer
• Why am I failing?
• Where am I using that?
• Note: This is an A level grade not GCSE. 
“A man is born gentle and weak; at his death he is hard and stiff. Green plants are
tender and filled with sap; at their death they are withered and dry. Therefore, the
stiff and unbending is a disciple of death; the gentle and yielding is a disciple of
life.” - Tao Te Ching (chapter 76)
Use Models to improve others
• How to the decisions I make affect my grading
scores?
• How frequently do I have to restack?
• What is the impact of package choices?
• Ruby or Python?
• MySQL or Postgres?
• Apache or Nginx?
“The farther you go, the less you know. Thus the sage knows without traveling; He
sees without looking; He works without doing.” - Tao Te Ching (chapter 47)
The Innovation Race reduxWoah… what happened
to my advantage?
“If I have even just a little sense, I will walk on the main road and my only fear will
be of straying from it.” - Tao Te Ching (chapter 53)
Woohoo!!! Now
we’re innovating at
speed!!
LONDON 2015Join the conversation #devseccon
Thank you.
For more information
DevSecOps.org
linkedin.com/grp/home?gid=6817408
github.com/devsecops
twitter.com/devsecops
terebess.hu/english/tao/gia.html

More Related Content

Viewers also liked

DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileNordic APIs
 
Renato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildRenato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildDevSecCon
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure APITwobo Technologies
 
OAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for MicroservicesOAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for MicroservicesTwobo Technologies
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
Transforming Organizations with CI/CD
Transforming Organizations with CI/CDTransforming Organizations with CI/CD
Transforming Organizations with CI/CDCprime
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldVMware Tanzu
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017kieranjacobsen
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon
 
Matt carroll - "Security patching system packages is fun" said no-one ever
Matt carroll - "Security patching system packages is fun" said no-one everMatt carroll - "Security patching system packages is fun" said no-one ever
Matt carroll - "Security patching system packages is fun" said no-one everDevSecCon
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsSuman Sourav
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectJonathan LeBlanc
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonDevSecCon
 
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineAnatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineRobert McDermott
 
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...Publicis Sapient Engineering
 

Viewers also liked (20)

DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
 
Renato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildRenato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wild
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure API
 
OAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for MicroservicesOAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for Microservices
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
Transforming Organizations with CI/CD
Transforming Organizations with CI/CDTransforming Organizations with CI/CD
Transforming Organizations with CI/CD
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
 
Matt carroll - "Security patching system packages is fun" said no-one ever
Matt carroll - "Security patching system packages is fun" said no-one everMatt carroll - "Security patching system packages is fun" said no-one ever
Matt carroll - "Security patching system packages is fun" said no-one ever
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
 
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineAnatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
 
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...
XebiConFr 15 - À la recherche du temps (perdu) entre le use case metier et s...
 

Similar to Tao of security science

Workshop creativity
Workshop creativityWorkshop creativity
Workshop creativityFloris Koot
 
Philosophy of Management powerpoint presentationpptx
Philosophy of Management powerpoint presentationpptxPhilosophy of Management powerpoint presentationpptx
Philosophy of Management powerpoint presentationpptxMrDampha
 
Creativity to Innovation
Creativity to Innovation Creativity to Innovation
Creativity to Innovation Mike Cardus
 
Doctor of Management in Philosophy presentation
Doctor of Management in Philosophy presentationDoctor of Management in Philosophy presentation
Doctor of Management in Philosophy presentationMrDampha
 
Chop Wood, Carry Water
Chop Wood, Carry WaterChop Wood, Carry Water
Chop Wood, Carry WaterAndrew Shafer
 
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdfperspegrity5
 
Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distributionMatt Mansell
 
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile ProjectsAgile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile ProjectsAlan Richardson
 
critical thinking ppt.pdf
critical thinking ppt.pdfcritical thinking ppt.pdf
critical thinking ppt.pdfMamRocilValdez
 
Virtue ethics newest version final ppt
Virtue ethics newest version final pptVirtue ethics newest version final ppt
Virtue ethics newest version final pptmargielucas
 
Virtue ethics newest version final ppt
Virtue ethics newest version final pptVirtue ethics newest version final ppt
Virtue ethics newest version final pptmargielucas
 
Jonathan Lewis: Context for Growth - Leadership at Boye 18
Jonathan Lewis: Context for Growth - Leadership at Boye 18Jonathan Lewis: Context for Growth - Leadership at Boye 18
Jonathan Lewis: Context for Growth - Leadership at Boye 18Boye & Co
 
Learning leader
Learning leaderLearning leader
Learning leadermilobo
 
Facilitator Training - Pam
Facilitator Training - PamFacilitator Training - Pam
Facilitator Training - PamLesHirst
 
Design and Darkmatter, Connecting Storytelling with Business Outcomes
Design and Darkmatter, Connecting Storytelling with Business OutcomesDesign and Darkmatter, Connecting Storytelling with Business Outcomes
Design and Darkmatter, Connecting Storytelling with Business OutcomesTrip O'Dell
 
Roy Leighton Itl Swanmore From Knowing To Doing
Roy Leighton Itl   Swanmore   From Knowing To DoingRoy Leighton Itl   Swanmore   From Knowing To Doing
Roy Leighton Itl Swanmore From Knowing To DoingAshleigh Thomson
 
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdfJack Pringle
 

Similar to Tao of security science (20)

Workshop creativity
Workshop creativityWorkshop creativity
Workshop creativity
 
Philosophy of Management powerpoint presentationpptx
Philosophy of Management powerpoint presentationpptxPhilosophy of Management powerpoint presentationpptx
Philosophy of Management powerpoint presentationpptx
 
Creativity to Innovation
Creativity to Innovation Creativity to Innovation
Creativity to Innovation
 
Doctor of Management in Philosophy presentation
Doctor of Management in Philosophy presentationDoctor of Management in Philosophy presentation
Doctor of Management in Philosophy presentation
 
Chop Wood, Carry Water
Chop Wood, Carry WaterChop Wood, Carry Water
Chop Wood, Carry Water
 
Shaping Serendipity
Shaping SerendipityShaping Serendipity
Shaping Serendipity
 
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf
2022 IEC Murray_wisdom skills-upside down SHARABLE.pdf
 
Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distribution
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile ProjectsAgile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
 
critical thinking ppt.pdf
critical thinking ppt.pdfcritical thinking ppt.pdf
critical thinking ppt.pdf
 
Virtue ethics newest version final ppt
Virtue ethics newest version final pptVirtue ethics newest version final ppt
Virtue ethics newest version final ppt
 
Virtue ethics newest version final ppt
Virtue ethics newest version final pptVirtue ethics newest version final ppt
Virtue ethics newest version final ppt
 
Jonathan Lewis: Context for Growth - Leadership at Boye 18
Jonathan Lewis: Context for Growth - Leadership at Boye 18Jonathan Lewis: Context for Growth - Leadership at Boye 18
Jonathan Lewis: Context for Growth - Leadership at Boye 18
 
Introduction to-critical- thinking
Introduction to-critical- thinkingIntroduction to-critical- thinking
Introduction to-critical- thinking
 
Learning leader
Learning leaderLearning leader
Learning leader
 
Facilitator Training - Pam
Facilitator Training - PamFacilitator Training - Pam
Facilitator Training - Pam
 
Design and Darkmatter, Connecting Storytelling with Business Outcomes
Design and Darkmatter, Connecting Storytelling with Business OutcomesDesign and Darkmatter, Connecting Storytelling with Business Outcomes
Design and Darkmatter, Connecting Storytelling with Business Outcomes
 
Roy Leighton Itl Swanmore From Knowing To Doing
Roy Leighton Itl   Swanmore   From Knowing To DoingRoy Leighton Itl   Swanmore   From Knowing To Doing
Roy Leighton Itl Swanmore From Knowing To Doing
 
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdf
 

More from DevSecCon

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon
 

More from DevSecCon (20)

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Tao of security science

  • 1. LONDON 2015Join the conversation #devseccon DevSecOps - The 道 of Security Science Scott C. Kennedy - Security Scientist Cloud Security Team - Intuit
  • 2. What is Tao? 道? • Not a ‘name for a ‘thing’ • An underlying natural order of the universe • Hard to grasp, easy to see. • 道 = Radical 辶 (go forward/walk/walking) + 首 (head) • Loosely understood as a concept of… • A road, way, path, or route • The way one goes somewhere • Or a doctrine, principle • The way one does or believes something All quotes used in this text box are from The Complete Tao Te Ching Translated by Gia-fu Feng and Jane English, Vintage Books, 1989
  • 3. Examples of Tao • ‘Nature does not hurry, yet everything is accomplished.’ - Lao Tzu • What does that mean? • It’s like growing older • Everyone does it. • It’s hard to understand how it happens • Yet it feels natural 3 “In dealing with others, be gentle and kind. In speech, be true. In ruling, be just. In daily life, be competent. In action, be aware of the time and the season. No fight: No blame. ” - Tao Te Ching (chapter 48)
  • 4. How to relate to IT/Security? “The world is ruled by letting things take their course, it cannot be ruled by interfering.” - Tao Te Ching (chapter 48)
  • 5. Which works better? DevSecOps “Nothing is more soft and yielding than water, yet for attacking the solid and the strong, nothing is better.” - Tao Te Ching (chapter 78)
  • 6. The Innovation Race Security: did you see something fly by? Security: if only they’d engage us sooner… Sigh…by the time I get to the finish line, I have to start all over again Hope nothing catches up with us… “The softest thing in the universe, Overcomes the hardest thing in the universe.” - Tao Te Ching (chapter 43)
  • 7. The Arts/Wushu of DevSecOps DevSecOps Security Engineering Experiment, Automate, Test Security Operations Hunt, Detect, Contain Compliance Operations Respond, Manage, Train Security Science Learn, Measure, Forecast “Empty yourself of everything. Let the mind become still. The ten thousand things rise and fall while the Self watches their return. They grow and flourish and then return to the source.” - Tao Te Ching (chapter 78)
  • 8. Security Science? • From F.U.D. to facts • Science is a fact-based examination • Theories established • Testable against real data • Revised and retested as the landscape changes… • Question -> Hypotheses -> Experiment -> Analyze -> Repeat • Answers simple questions “Knowing ignorance is strength; ignoring knowledge is sickness.” - Tao Te Ching (chapter 71)
  • 9. Examples of Security Science • What is your Password policy? • With an attacker with a budget of $10,000, we ought to set our minimum length to 12 characters if we rotate our passwords every 90 days. • How frequently do you need to patch/restack? • With the Amazon RHEL image, it’s every 5.3 days. • With our base RHEL image, it’s 10.5 days. • Minimum Length of password vs. algorithm used? • MD-5 = 19 characters • SHA-512 = 11 characters • Bcrypt = 8 characters “The truly great man dwells on what is real and not what is on the surface.” - Tao Te Ching (chapter 38)
  • 10. How to start Security Science? • Look at your company. • What questions need answers? • Theorize a solution • How do you think to solve this? • Gather data to investigate. • What sources do you need? • What are you missing? How to get it? • Analyze data to confirm/dispute • Was your assumption, correct? “Perseverance is a sign of will power. He who stays where he is endures.” - Tao Te Ching (chapter 33) We keep getting Phished! Can Training Help? Server Logs Phish Users Did Phish training reduce phishing success?
  • 11. Phishing ourselves taught us… • We phished our own security team at Intuit. • Had a very well crafted phish to mimic internal processes • Achieved a 54% click through rate • Women are 25% more likely than men to click • 1/3 tested will click on a link, access a site and enter details even when they suspect it is suspicious • Existing security awareness/phishing training campaigns did not prevent this “In caring for others and serving heaven, There is nothing like using restraint. Restraint begins with giving up one's own ideas.” - Tao Te Ching (chapter 59)
  • 12. Where can we use more Science? “Knowing others is wisdom; Knowing the self is enlightenment. Mastering others requires force; Mastering the self needs strength. He who knows he has enough is rich. ” - Tao Te Ching (chapter 33)
  • 13. Ways to “move the needle” • Scoring/Grades are powerful motivators • Allows the Dev leader to drill down to answer • Why am I failing? • Where am I using that? • Note: This is an A level grade not GCSE.  “A man is born gentle and weak; at his death he is hard and stiff. Green plants are tender and filled with sap; at their death they are withered and dry. Therefore, the stiff and unbending is a disciple of death; the gentle and yielding is a disciple of life.” - Tao Te Ching (chapter 76)
  • 14. Use Models to improve others • How to the decisions I make affect my grading scores? • How frequently do I have to restack? • What is the impact of package choices? • Ruby or Python? • MySQL or Postgres? • Apache or Nginx? “The farther you go, the less you know. Thus the sage knows without traveling; He sees without looking; He works without doing.” - Tao Te Ching (chapter 47)
  • 15. The Innovation Race reduxWoah… what happened to my advantage? “If I have even just a little sense, I will walk on the main road and my only fear will be of straying from it.” - Tao Te Ching (chapter 53) Woohoo!!! Now we’re innovating at speed!!
  • 16. LONDON 2015Join the conversation #devseccon Thank you. For more information DevSecOps.org linkedin.com/grp/home?gid=6817408 github.com/devsecops twitter.com/devsecops terebess.hu/english/tao/gia.html

Editor's Notes

  1. With DevSecOps, a Security Science mindset is a key component in being able to cut through the Fear, Uncertainty, and Doubt of security decisions and provide a science based method to uncover insights, guide development, and develop policies that measurably change the over security posture of your organization.
  2. Tao or Dao a Chinese concept signifying 'way', 'path', 'route', or sometimes more loosely, 'doctrine' or 'principle'. Within the context of traditional Chinese philosophy and religion, The Tao is the intuitive knowing of "life" that of which cannot be grasped full-heartedly as just a concept but known nonetheless through actual living experience of one's everyday being. [Dao] means a road, path, way; and hence, the way in which one does something; method, doctrine, principle
  3. [Shannon]
  4. "