SlideShare a Scribd company logo
1 of 16
10 Myths of Information Security
Greg Sternberg, MSc, CISSP
Myths
Myth #1: Security doesn't need to
know a company's business

Today, not only the consumer
but everyone in the world
(potentially) has access to a
company's data and
applications.

security and legal have more
in common than IT and
security

security is part of your
business because criminals
want part of your business
Myth #2: Security prevents break-
ins

the 'right' amount of security
will prevent a break-in

doctor's role in preventing a
cold

security is responsible for
monitoring the health of a
company
Myth #3: Security makes your
company safer

Seat belts actually enable you
to drive faster

lets the company take bigger
risks

Lawyers don't decide if a
company's marketing strategy
should target the 20-25
demographic but they will tell
you what the legal risks are
Myth #4: What you don't know won't
hurt you

breaking their supposedly
unbreakable code

you locked the door to your
house but did you know your
back door was unlocked -
Security is both a feeling and
a reality. And they're not the
same.

Ignorantia juris non excusat
Myth #5: I'm not a target because
[insert a reason]

It doesn't matter what you
think you have or don't have
it's what the attacker thinks
you have or could do for them

what would happen if every
computer in your company
became a brick because the
attacker encrypted the hard
drive of every computer

ramifications might be if a
company's computers were
used to break into another
company's computers? How
Myth #6:Security is something you
can complete

Since things in IT have end
dates and can be delivered
many think security has the
same criteria

“Why do the police wear
kelvar vests today and they
didn't in the 60's?” The
answer is, “Because the
criminals have bigger guns
then they did in the 60's.”

Attackers aren't static
Myth #7: We are better than
attackers because [insert reason]

young naive teenagers
who have pasty skin
and live with their
mothers

They can have teams
who have distinct
purposes and are
managed like any
project in a corporation

#3
− Sternberg Arabians,
L.L.C
Myth #8: Security insurance will
solve security

I'll just buy security insurance
instead of paying for a
security program

Insurance companies may
sell protection but they're in
the game to make a profit.
And they don't make a profit
by paying for breaches

Insurance can't pay for
everything

Does your company have to
pockets of Sony (or Target or
*Apologies to Travelers
Myth #9: Compliance = security

PCI compliant with
passwords like
'Passw0rd!'

HITECH doesn't prevent
employees from phishing
attacks

No compliance
regulations will protect a
company from a zero day
attack

PCI 2.0 was released in
Myth #10: The job of security is
security

CFO a corporate officer
primarily responsible for
managing the financial
risks of the corporation

CLO: In a company, the
person holding the
position typically reports
directly to the CEO, and
their duties involve
overseeing and identifying
the legal issues in all
departments and their
Myth #10: The job of security is
security

CSO description (from
investopedia):
The company executive
responsible for the
security of personnel,
physical assets and
information in both
physical and digital form.
The importance of this
position has increased in
the age of information
technology as it has
Myth #10: The job of security is
security

CSO description (from
investopedia):In a
company, the CSO duties
involve overseeing and
identifying the security
and privacy issues in all
departments and their
interrelation, including
engineering, design,
marketing, sales,
distribution, credit,
finance, human
Questions?

<blah>
Supporting Slides

More Related Content

Viewers also liked

Viewers also liked (9)

Formas y animaciones leidy
Formas y animaciones leidyFormas y animaciones leidy
Formas y animaciones leidy
 
Anato
AnatoAnato
Anato
 
Formas y animaciones
Formas y animacionesFormas y animaciones
Formas y animaciones
 
P2P型CDN
P2P型CDNP2P型CDN
P2P型CDN
 
キャッシュサーバ運用技術
キャッシュサーバ運用技術キャッシュサーバ運用技術
キャッシュサーバ運用技術
 
CDNとCDSPビジネスの動向と展望
CDNとCDSPビジネスの動向と展望CDNとCDSPビジネスの動向と展望
CDNとCDSPビジネスの動向と展望
 
ストリーミングCDN2001
ストリーミングCDN2001ストリーミングCDN2001
ストリーミングCDN2001
 
ストリーミングCDN2002
ストリーミングCDN2002ストリーミングCDN2002
ストリーミングCDN2002
 
CDNの必要性と将来性
CDNの必要性と将来性CDNの必要性と将来性
CDNの必要性と将来性
 

Similar to 10myths

Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessGeorgian
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium PartnersDAVID BERGH
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 

Similar to 10myths (20)

Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your Business
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 

10myths

  • 1. 10 Myths of Information Security Greg Sternberg, MSc, CISSP
  • 3. Myth #1: Security doesn't need to know a company's business  Today, not only the consumer but everyone in the world (potentially) has access to a company's data and applications.  security and legal have more in common than IT and security  security is part of your business because criminals want part of your business
  • 4. Myth #2: Security prevents break- ins  the 'right' amount of security will prevent a break-in  doctor's role in preventing a cold  security is responsible for monitoring the health of a company
  • 5. Myth #3: Security makes your company safer  Seat belts actually enable you to drive faster  lets the company take bigger risks  Lawyers don't decide if a company's marketing strategy should target the 20-25 demographic but they will tell you what the legal risks are
  • 6. Myth #4: What you don't know won't hurt you  breaking their supposedly unbreakable code  you locked the door to your house but did you know your back door was unlocked - Security is both a feeling and a reality. And they're not the same.  Ignorantia juris non excusat
  • 7. Myth #5: I'm not a target because [insert a reason]  It doesn't matter what you think you have or don't have it's what the attacker thinks you have or could do for them  what would happen if every computer in your company became a brick because the attacker encrypted the hard drive of every computer  ramifications might be if a company's computers were used to break into another company's computers? How
  • 8. Myth #6:Security is something you can complete  Since things in IT have end dates and can be delivered many think security has the same criteria  “Why do the police wear kelvar vests today and they didn't in the 60's?” The answer is, “Because the criminals have bigger guns then they did in the 60's.”  Attackers aren't static
  • 9. Myth #7: We are better than attackers because [insert reason]  young naive teenagers who have pasty skin and live with their mothers  They can have teams who have distinct purposes and are managed like any project in a corporation  #3 − Sternberg Arabians, L.L.C
  • 10. Myth #8: Security insurance will solve security  I'll just buy security insurance instead of paying for a security program  Insurance companies may sell protection but they're in the game to make a profit. And they don't make a profit by paying for breaches  Insurance can't pay for everything  Does your company have to pockets of Sony (or Target or *Apologies to Travelers
  • 11. Myth #9: Compliance = security  PCI compliant with passwords like 'Passw0rd!'  HITECH doesn't prevent employees from phishing attacks  No compliance regulations will protect a company from a zero day attack  PCI 2.0 was released in
  • 12. Myth #10: The job of security is security  CFO a corporate officer primarily responsible for managing the financial risks of the corporation  CLO: In a company, the person holding the position typically reports directly to the CEO, and their duties involve overseeing and identifying the legal issues in all departments and their
  • 13. Myth #10: The job of security is security  CSO description (from investopedia): The company executive responsible for the security of personnel, physical assets and information in both physical and digital form. The importance of this position has increased in the age of information technology as it has
  • 14. Myth #10: The job of security is security  CSO description (from investopedia):In a company, the CSO duties involve overseeing and identifying the security and privacy issues in all departments and their interrelation, including engineering, design, marketing, sales, distribution, credit, finance, human

Editor's Notes

  1. Myth: “a popular belief or tradition that has grown up around something or someone; especially: one embodying the ideals and institutions of a society or segment of society“ Even though banana plants can grow to be 30 feet in height, they’re not technically trees: their stems are sturdy, but contain no woody tissue. They’re not trunks, but “pseudostems,” made of densely packed leaves. So a banana plant is actually a perennial herb, like a lily or an orchid. Technically, the banana fruit is the berry of the plant—it may not look much like one, but it contains seeds and pulp from a single ovary, so it’s often classified as an “epigynous berry.”
  2. Today company data and applications are running on devices which are not owned by the company and probably don&amp;apos;t even know about Neither legal or security would be needed if people could be trusted Security is part of your business because criminals want part of your business Keeping security disconnected from the workings of your business doesn&amp;apos;t keep criminals from your business Like legal: Security needs to understand what risks might arise with a particular course of action Security must work across and with all departments to understand what physical and logical assets need to be protected Security must understand the financial resources of a company as well so it can provide decision makers with an appropriate set of risk mitigation choices
  3. A dangerous one we sometimes believe Consider we&amp;apos;ve spent thousands of years trying to protect houses from break-ins but if someone wants into a house bad enough there&amp;apos;s little that can be done to prevent it And that&amp;apos;s ignoring when your children leave the house and forget to lock the door Security provides a appropriate set of procedures to follow and presents a list of appropriate choices to the company Which you can ignore like your doctor&amp;apos;s advice Like you are responsible for monitoring your own symptoms and telling your doctor if you&amp;apos;ve stopped breathing
  4. Dangerous because it&amp;apos;s partially true Security is more like the seat belts in your car So what are seat belts for? Most say seat belts are there to make driving safer or reduce injury. Truth be told the best way to do that isn&amp;apos;t to use seat belts at all but to drive at 10 MPH or not drive at all. Seat belts actually enable you to drive faster Security lets the company take bigger risks. The safest thing to do is not have a shopping portal since then attackers won&amp;apos;t be able to break in and steal information Security allows a company to take on that bigger risk at a level that is acceptable Lawyers don&amp;apos;t decide if a company&amp;apos;s marketing strategy should target the 20-25 demographic but they tell you what the legal risks are. Understanding the true risks in a business venture helps a company make appropriate decisions based on the risk tolerance and the potential gain.
  5. Victory goes to the unexpected Blitzkrieg, enigma machine, Bruce Schneier once said that “Security is both a feeling and a reality. And they&amp;apos;re not the same.” Security can only protect and harden what it knows about. Having developers keep computers under their desk to avoid dealing with the overhead of procurement and security may seem like a good business decision Ignorantia juris non excusat - just because you didn&amp;apos;t know about something or feel it was a concern doesn&amp;apos;t mean you can&amp;apos;t be fined, sued or suffer company damage. Attackers don&amp;apos;t care how much money or effort you saved.
  6. Attackers break into &amp;apos;Mom &amp; Pop&amp;apos; HVAC shops so they can go after bigger retail fish. Attackers troll social media for employee information so they can get access to a company through those employees. Attacker don&amp;apos;t even need to use a company&amp;apos;s system
  7. Attackers don&amp;apos;t find one vulnerability and call it done. They&amp;apos;ll download the same software you use (i.e. OpenSSL, Windows, ...), dig through the application and source code and try different types of attacks until they find one that works. They continue to attack with that until the attack is blocked or they get in They&amp;apos;ll go back to the drawing boards and try again
  8. Their code disguises itself and can run mostly unattended in hostile environments Their code may run for days, months or even years without anyone noticing They can have teams who have distinct purposes and are managed like any project in a corporation Malware communicates back to their control server over secure connections using digital certificates, just like any secure corporate application does It can perform online updates and may have hundreds or thousands of cooperating instances scattered across the globe Besides, what&amp;apos;s the worst that happens if their code doesn&amp;apos;t work on your system the first time? Try and try again
  9. Apologies to Travelers Don&amp;apos;t pay if: Don&amp;apos;t have an existing security program Didn&amp;apos;t follow the recommendations (reasonable or not) of your security group Didn&amp;apos;t train your employees to not click on phishing links Sony hacked multiple times their internal memos and other sensitive (a.k.a. embarrassing) items leaked lost intellectual property (although it&amp;apos;s a stretch calling “The Interview” intellectual) became a pawn in a conflict between the US and North Korea they unwittingly set a precedence when they caved in and didn&amp;apos;t release “The Interview” even when they did backpedal attackers are thinking that maybe, if they attack a smaller company who won&amp;apos;t be noticed by the government they could direct that company to do their bidding.
  10. Being compliant doesn&amp;apos;t mean you&amp;apos;re secure any more than getting a drivers license makes you a good driver. Compliance only means you are following the dictates of an external entity who doesn&amp;apos;t know the systems and the company Compliance may give companies a false sense of security by making them think they are secure just because they followed a checklist A company can be PCI compliant with passwords like &amp;apos;Password1&amp;apos; HITECH doesn&amp;apos;t prevent employees from phishing attacks No compliance regulations will protect a company from a zero day attack or a system that&amp;apos;s improperly configured. Compliance standards change slowly and require a committee to approve. It may take months, if not years, to change. PCI 2.0 was released in 2010 and it took three years before 3.0 was released. It&amp;apos;s 2015 now and you can be sure that malware has changed significantly since PCI 3.0 was released. A compliance program can serve as a security foundation
  11. That&amp;apos;s right – focus. The first two are focused on company matters and the last two are focused on project or group matters - he first two need to know where the forest is and the last two need to know where the trees are.
  12. doesn&amp;apos;t focus on the company. But you&amp;apos;re not a CSO, you say. If a programmer writes perfect code without any bugs that runs instantaneously then that&amp;apos;s very good. If a manager keeps their projects on time and under budget then that&amp;apos;s very good. Same with an HR generalist, if they hire perfect employees and keep them happy then that&amp;apos;s very good too. Contrast that with security – the only way we can prevent breaches and data from being stolen is to put them on a single computer, power down the computer, encase it in concrete and drop it in the Marrenis trench. Problem is no one else can use it either. Even the most hands-on of security practitioners needs to understand their affect on the company. Something as innocuous as changing passwords to be 32 characters may improve security but at the cost of employees not getting their job done and a massive increase in helpdesk tickets.
  13. If we take &amp;apos;legal&amp;apos; and substitute &amp;apos;security&amp;apos; in the CLO definition (from Investopedia) we&amp;apos;ll have a much better definition for a CSO, in specific, and security in general Security isn&amp;apos;t about maximizing shareholder value, spending a minimal amount and getting maximal gain, improving operational efficiencies, working with IT and technology to meet business needs- it&amp;apos;s about ensuring that nothing, including security itself, gets in the way of those goals.
  14. &amp;lt;more&amp;gt;