SlideShare a Scribd company logo
1 of 123
Download to read offline
Connect | Protect | Optimize
The 5 Ps of Preparedness
Why Hope is NOT a Strategy
Rafal Los – VP, Chief Security Strategist
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
./whoami
Just in case you don’t know me
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
strategist, advisor
strategy executive
~25 years in ”the business”
writer
VP, Chief Security Strategist –
Lightstream Managed Services
professional translator
Founder
Down the Security Rabbithole Podcast
father of twins
Hope is not a strategy
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Wishing for the best, probably won’t work.
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
incidents are inevitable
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“cost of doing business”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
panic and chaos is avoidable
Complexity Averted.
Possibilities Realized.
© 2019 Lightstream
Communications. All rights reserved.
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
how much impact
is self-inflicted?
Complexity Averted.
Possibilities Realized.
© 2019 Lightstream
Communications. All rights reserved.
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“If you fail to prepare…”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
preparation has a formula
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
5 core components
Program
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Comprehensive, aligned approach
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
cannot over-state importance
manifestation of strategy
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
strategy à program
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
define a structured approach
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
budget
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
staff
Complexity Averted.
Possibilities Realized.
© 2019 Lightstream
Communications. All rights reserved.
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
resources
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
tip: align to a framework
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
I suggest NIST CSF
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
identify protect detect respond recover
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
response is a capability
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
align resources
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
internal resources
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
+ external support
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
+ law enforcement
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
+ legal, insurance, PR, etc
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
must work together
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
within your means
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
know your constraints
Policy
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Declaration of your operating principles
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
explicit declaration of
rules
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what you must do
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what you can do
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what you can not do
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
definition of duties
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
explicit obligations
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
regulatory and legal
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
concise, unambiguous
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
will be scrutinized
tested
questioned
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
will you pay a ransom?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
will you remediate, or
replace?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
who has authority?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
who has accountability?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
when do you report?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
policy is a legal framework
Plan
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Simple, understandable instructions
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
the value of a plan,
is in the ability to execute
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
plans are tricky
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
easy to overbuild
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
easy to over-complicate
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
do not make a ‘book’
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
nobody will read it
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
nobody reads the
extinguisher manual in a
fire
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
make it simple
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
make it concise
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
make it comprehensive
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
make it flexible
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
make it accessible
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
how to screw it up –
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“200 pages, in a binder”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“online, on the network”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“last reviewed 3 years ago”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“specific people, not roles”
People
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Someone must hold the door
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
it’s easy to forget ”people”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
2:00am, Tuesday:
ransomware has encrypted all
workstations…
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
this is a delicate situation
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
first call?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
call tree?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
incident response,
legal,
leadership,
board,
press?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
who can make decisions?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
can you contain/mitigate?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
people <> communicate
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
maintain confidentiality
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
communicate effectively
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
name vs. role
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what if they’re on vacation?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: chain of command
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: [approved] IR vendors
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: outside counsel
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: insurance
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: 3rd parties
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
what about: your employees
Practice
Complexity Averted. Possibilities Realized. © 2019 Lightstream Communications. All rights reserved.
Practice makes better than a mess
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
repeat after me: practice
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
things likely won’t go to plan
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
“works on paper”
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
real-life may be different
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
plan A … F
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
things WILL go wrong
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
learn from F1 teams
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
practice, for real-life
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
practice, in real-life
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
practice non-ideal
situations
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
did you learn anything new?
Complexity Averted. Possibilities Realized. © 2022 Lightstream Communications. All rights reserved.
Thank you!
• Where to find me
- Twitter
• @Wh1t3Rabbit and @DtSR_Podcast
- Down the Security Rabbithole Podcast
• iTunes, RSS (https://ftwr.libsyn.com), and almost literally anywhere else
- Lightstream – Consulting, Professional & Managed Services
• www.Lightstream.tech
- LinkedIn:
• https://www.linkedin.com/in/rmlos/
• https://www.linkedin.com/company/down-the-security-rabbithole-podcast
Complexity Averted.
Possibilities Realized.
www.lightstream.tech

More Related Content

Similar to The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...African Cyber Security Summit
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeSaraPia5
 
DNN Connect 2015 Keynote
DNN Connect 2015 KeynoteDNN Connect 2015 Keynote
DNN Connect 2015 KeynoteJoe Brinkman
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfCraig Saunders
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleDevOps.com
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?Colleen Beck-Domanico
 
Z Venture Capital採用_220927.pdf
Z Venture Capital採用_220927.pdfZ Venture Capital採用_220927.pdf
Z Venture Capital採用_220927.pdfShogoTakahashi1
 
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...MongoDB
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerCloudflare
 
Investor-Day-22-PDF (1).pdf
Investor-Day-22-PDF (1).pdfInvestor-Day-22-PDF (1).pdf
Investor-Day-22-PDF (1).pdfBanco Popular
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Rise of the Data Cloud
Rise of the Data CloudRise of the Data Cloud
Rise of the Data CloudKent Graziano
 
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...confluent
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringAaron Rinehart
 

Similar to The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf (20)

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with Everbridge
 
DNN Connect 2015 Keynote
DNN Connect 2015 KeynoteDNN Connect 2015 Keynote
DNN Connect 2015 Keynote
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
7-Cloudy with a chance of digitalization.pdf
7-Cloudy with a chance of digitalization.pdf7-Cloudy with a chance of digitalization.pdf
7-Cloudy with a chance of digitalization.pdf
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
 
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development LifecycleThe Microservices Manifesto: How to Get More Out of the Development Lifecycle
The Microservices Manifesto: How to Get More Out of the Development Lifecycle
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
Z Venture Capital採用_220927.pdf
Z Venture Capital採用_220927.pdfZ Venture Capital採用_220927.pdf
Z Venture Capital採用_220927.pdf
 
Insurance forum august 2014
Insurance forum   august 2014Insurance forum   august 2014
Insurance forum august 2014
 
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
Investor-Day-22-PDF (1).pdf
Investor-Day-22-PDF (1).pdfInvestor-Day-22-PDF (1).pdf
Investor-Day-22-PDF (1).pdf
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Rise of the Data Cloud
Rise of the Data CloudRise of the Data Cloud
Rise of the Data Cloud
 
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 

More from Rafal Los

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning warsRafal Los
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013Rafal Los
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rafal Los
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Rafal Los
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessRafal Los
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Rafal Los
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Rafal Los
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationRafal Los
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelRafal Los
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Rafal Los
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Rafal Los
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0Rafal Los
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Rafal Los
 
Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Rafal Los
 

More from Rafal Los (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
 
Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf