Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster

May. 18, 2018
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster
1 of 30

More Related Content

Slideshows for you

The Modern Collaboration Hub: Using Slack and Atlassian to Integrate People, ...The Modern Collaboration Hub: Using Slack and Atlassian to Integrate People, ...
The Modern Collaboration Hub: Using Slack and Atlassian to Integrate People, ...Cprime
OWASP Developer Guide RebootOWASP Developer Guide Reboot
OWASP Developer Guide RebootAndrew van der Stock
DevOps Picc12 Management TalkDevOps Picc12 Management Talk
DevOps Picc12 Management TalkMichael Rembetsy
Like Herding Cats: How to Get Engineers to Update Their StatusLike Herding Cats: How to Get Engineers to Update Their Status
Like Herding Cats: How to Get Engineers to Update Their StatusAtlassian
Testing in Agile with Coaching Agile Journeys and XBOSoftTesting in Agile with Coaching Agile Journeys and XBOSoft
Testing in Agile with Coaching Agile Journeys and XBOSoftXBOSoft
The 7 Habits of Effective Data Driven CompaniesThe 7 Habits of Effective Data Driven Companies
The 7 Habits of Effective Data Driven CompaniesGoDataDriven

Similar to Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster

Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365 Splunk
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOpsIrina Kostina
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
Get High-Octane Virtual Datacenter PerformanceGet High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceSolarWinds
Embracing New NormalEmbracing New Normal
Embracing New NormalSSFIndia1
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World

Similar to Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster (20)

Recently uploaded

CloudStack Managed User-data & DemoCloudStack Managed User-data & Demo
CloudStack Managed User-data & DemoShapeBlue
NoSQL Database Migration Masterclass - Session 3: Migration LogisticsNoSQL Database Migration Masterclass - Session 3: Migration Logistics
NoSQL Database Migration Masterclass - Session 3: Migration LogisticsScyllaDB
Stanford AI Report 2023Stanford AI Report 2023
Stanford AI Report 2023Kapil Khandelwal (KK)
An Introduction To Using ChatGPT For BusinessAn Introduction To Using ChatGPT For Business
An Introduction To Using ChatGPT For BusinessPaul Nguyen
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)Alex Pruden
Carrom Pool Mod APK.docxCarrom Pool Mod APK.docx
Carrom Pool Mod APK.docxRayJ12

Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster

  1. SCALING SECURITY WORKFLOWS AND GETTING HIRED BY A CROWD SOURCING SECURITY TEAM GOHER MOHAMMAD PHOTOBOX GROUP HEAD OF SECURITY AND COMPLIANCE
  2. MY BACKGROUND • Graduated in 2000 • Got my first IT job in 2001 – Very Corporate • Got my first IT Leader role in 2004 for Omnicom group • Went back to corporate rigidity 2017 • Now at Photobox Group Security as Acting Head of Risk and Compliance
  3. CHALLENGE • Have worked in a traditional environment • Now working in an agile environment • Both have the pros and cons
  4. CHALLENGE Traditional environments are very comprehensive and organized
  5. CHALLENGE But so slow to get anything done and very unscalable at speed
  6. CHALLENGE Agile environments work at super speed!
  7. CHALLENGE But trying to keep track of everything
  8. HOW DO WE SCALE SECURITY WORKFLOWS AT SPEED?
  9. We have to integrate with current place of work practices
  10. SCALING SECURITY WORKFLOWS • USE EXISTING IMPLEMENTED SYSTEM • USE A DATABASE MODEL (Where Possible) • USE A VISUAL PLATFORM TO BUILD A GRAPH DATABASE (Neo4J, AnzoGraph)
  11. CHALLENGE AT PHOTOBOX • PCI AUDIT • BUILD A SCALABLE SOLUTION • BUILD FOR THE FUTURE, GDPR, ISO 27001 AND MORE
  12. Does anyone like compliance? Does anyone like to be audited? 2 QUESTIONS
  13. Review Previous Audit Documentation and Policies Evidence Capture Review and Update Assess and Remediate TAS Assessment Check and Remediate Audit Central Server Storage and Jira Mapping PCI AUDIT
  14. DATA MAPPING OF POLICY INTO EXCEL
  15. DATA MAPPING INTO JIRA
  16. WORKFLOW
  17. SCALING FURTHER
  18. VISUALISE IN GRAPH DATABASE SUCH AS NEO4J
  19. SCALING SECURITY WORKFLOWS
  20. IN SHORT • Make use of the tools you have • It should be ‘templatable’, ‘bolt-onable’ and easy • It should translate across all levels of staff and people • It should be or be part of a foundation framework • It should be logical • It should be simple
  21. HOW TO BE HIRED FOR A CROWD SOURCING SECURITY TEAM?
  22. WHAT IS CROWDSOURCING? crowd·sourc·ing ˈkroudˌsôrsiNG/ noun noun: crowdsourcing; noun: crowd-sourcing • the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet. • "crowdsourcing is less expensive than hiring a professional translator"
  23. GETTING HIRED HAS CHANGED!
  24. THIS IS YOUR CV!
  25. GET YOURSELF KNOWN • Attend Security Workshops • Join Forums online • Ask questions from people already in the industry • Showcase who you are
  26. DISCUSSING WORKSHOPS…
  27. THANK YOU
  28. QUESTIONS?