SlideShare a Scribd company logo
1 of 107
Download to read offline
The Cost of
Complexity
Aaron Bedra
Chief Scientist, Jemurai
@abedra
keybase.io/abedra
This is a talk on
systems theory
I want to discuss our
approach to complexity
and problem solving
You are all
systems thinkers
At least you should
be!
Before we dive into
properties of systems,
let’s clear something up
Complicated
!=
Complex
Complicated: The definition of
insanity is doing the same thing
twice and expecting different
results
Complex: The definition of insanity
is doing the same thing twice and
expecting exactly the same
results
Complicated systems
are knowable
Complicated systems
are controllable
Order in complicated
systems is achieved via
best method of operation
Stability is achieved via
compliance with the best
method
Complex systems are
not knowable
A complete description
is impossible
A mathematical
description is intractable
Complex systems consist of
numerous components that are
interrelated in multiple ways
Complex systems are
open systems
Order in complex systems
cannot be imposed
Security is impossible
We live in a world of
open systems
But we treat them as
closed
We do this because
choice is forced on us
Unintentionally treating complex
systems as complicated sets us
up for failure
What is the objective
of your system?
“If you can't describe what you
are doing as a process, you
don't know what you're doing”
— W. Edwards Deming
Tools for Systems Thinkers: The 6 Fundamental Concepts of Systems Thinking
Interconnectedness
“A system is a set of components that work
together in particular environments to
perform whatever functions are required to
achieve the system’s objective”
— Donella Meadows
Everything is
connected
The choices we make are
typically not localized
And may cause new
emergent properties of
the system
When you interfere with the
system’s ability to achieve it’s
objective, it will find a new way
Password complexity
Emergence
Properties of a system
emerge from the interactions
between parts of the system
It is those properties that
we must reason about
Not the constraints we
impose on the system
Our choices create new
emergent properties
We must consider the potential
for new emergent properties
based on our choices
Do not rely on the expected
outcome, observe the
emergent properties!
Feedback Loops
“A complex system cannot be
reduced to the behavior or
compliance of individual components”
— Sidney Dekker et al
We focus heavily on
feedback loops
They are a major part of
every information system
Negative, or reinforcing
loops are an inherent part
of any stable system
But we lean too heavily
on reinforcing loops
The State of Security
Reinforcing loops reduce
diversity in the system
“Theoretically, success and resilience
in complex systems derives not from
compliance, but from diversity”
— Sidney Dekker et al
Synthesis
Our ability to see the
interconnectedness is
incredibly important
We are all skilled within
some part of the system
But most of us fail at
synthesis
Not because we can’t
do it
But because it’s not a
habit we have trained
Some of us have gotten
better at synthesis
Talk to your red team
for more information
Or your risk team*
Or better yet, spend
some time with the COO
Causality
The system outside our
system puts constraints
on our system
Constraints are meant
to be interpreted
Meeting a constraint is
about creating an outcome
In its truest form, it’s
about causality
There are typically
multiple ways to meet a
constraint
Or completely
disregard it
An effect cannot occur
before its cause
Before you react to an
effect, make sure a cause
exists!
“Rational behavior requires
theory. Reactive behavior
requires only reflex action”
— W. Edwards Deming
To be a great information
security professional you
must understand these ideas
While you may be
great at a part or two
It’s your understanding of
the system that makes
you truly valuable
We all need to get
better at this
Let’s bring it back to
our world for a minute
Why did it take so long
to fix meltdown?
While we understood the
microcode updates, there were
other properties of the system that
weren’t apparent
Bricked machines are really
secure, but they don’t help the
system achieve its objective
Why haven’t we fixed
Spectre yet?
Proposed Options
• lfence() (compiler / static analysis) (V1)
• Retpoline (compiler) (V2)
• cmov (static analysis / type checking) (perf)
• Move to a new architecture
Most of these options
require recompilation
Or at least starting up
with a new VM/JIT
What do we do?
What properties of the
system will guide you?
If one of the required properties
was high performance, what
does that say about the system?
What is the objective
of your system?
How do we get better?
Take a systems theory
approach to information
security
Getting better at systems
• Thinking in Systems: A Primer
• Drift into Failure
• Antifragile: Things That Gain from Disorder
• Introduction to the Modeling and Analysis of
Complex Systems
• https://www.complexityexplorer.org/
Getting better at risk
• Measuring and Managing Information Risk: A FAIR
Approach
• Fooled by Randomness: The Hidden Role of
Chance in Life and in the Markets
• How to Measure Anything in Cybersecurity Risk
Learn to create closed
models of a system for
analysis
Incorporate diversity
into your models
Incorporate randomness
into your models
Incorporate chaos
into your models
But most of all,
incorporate others
The Cost of Complexity

More Related Content

Similar to The Cost of Complexity

Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]David Wilson
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialWill Gallego
 
Management 3.0 - Complexity Thinking
Management 3.0 - Complexity ThinkingManagement 3.0 - Complexity Thinking
Management 3.0 - Complexity ThinkingJurgen Appelo
 
Defining Test Competence
Defining Test CompetenceDefining Test Competence
Defining Test CompetenceJohan Hoberg
 
Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxmelbruce90096
 
Bus 304 lecture 4-intro system concepts
Bus 304 lecture 4-intro system  conceptsBus 304 lecture 4-intro system  concepts
Bus 304 lecture 4-intro system conceptseduafo
 
Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01Myra Frazier
 
CST 20363 Session 2
CST 20363 Session 2CST 20363 Session 2
CST 20363 Session 2oudesign
 
JUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systemsJUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systemsBert Jan Schrijver
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberFrancis_McKinney
 
The Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systemsThe Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systemsbcantrill
 
System and its types
System and its typesSystem and its types
System and its typesnidhipandey79
 

Similar to The Cost of Complexity (20)

Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
 
Management 3.0 - Complexity Thinking
Management 3.0 - Complexity ThinkingManagement 3.0 - Complexity Thinking
Management 3.0 - Complexity Thinking
 
Defining Test Competence
Defining Test CompetenceDefining Test Competence
Defining Test Competence
 
system
systemsystem
system
 
dist_systems.pdf
dist_systems.pdfdist_systems.pdf
dist_systems.pdf
 
Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docx
 
Bus 304 lecture 4-intro system concepts
Bus 304 lecture 4-intro system  conceptsBus 304 lecture 4-intro system  concepts
Bus 304 lecture 4-intro system concepts
 
Chaos engineering
Chaos engineering Chaos engineering
Chaos engineering
 
Ch10
Ch10Ch10
Ch10
 
Systems Thinking
Systems ThinkingSystems Thinking
Systems Thinking
 
Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01
 
CST 20363 Session 2
CST 20363 Session 2CST 20363 Session 2
CST 20363 Session 2
 
JUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systemsJUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systems
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th December
 
The Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systemsThe Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systems
 
System and its types
System and its typesSystem and its types
System and its types
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
L7 Design For Recovery
L7 Design For RecoveryL7 Design For Recovery
L7 Design For Recovery
 
MSB-Distributed systems goals
MSB-Distributed systems goalsMSB-Distributed systems goals
MSB-Distributed systems goals
 

More from Aaron Bedra

AWS Security Essentials
AWS Security EssentialsAWS Security Essentials
AWS Security EssentialsAaron Bedra
 
Leveling the playing field
Leveling the playing fieldLeveling the playing field
Leveling the playing fieldAaron Bedra
 
Windy City Rails - Layered Security
Windy City Rails - Layered SecurityWindy City Rails - Layered Security
Windy City Rails - Layered SecurityAaron Bedra
 
Focus, SCNA 2011
Focus, SCNA 2011Focus, SCNA 2011
Focus, SCNA 2011Aaron Bedra
 
Repsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application SecurityRepsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application SecurityAaron Bedra
 
Pontificating quantification
Pontificating quantificationPontificating quantification
Pontificating quantificationAaron Bedra
 
Clojure in the Field
Clojure in the FieldClojure in the Field
Clojure in the FieldAaron Bedra
 
The Art of the Spike
The Art of the SpikeThe Art of the Spike
The Art of the SpikeAaron Bedra
 

More from Aaron Bedra (8)

AWS Security Essentials
AWS Security EssentialsAWS Security Essentials
AWS Security Essentials
 
Leveling the playing field
Leveling the playing fieldLeveling the playing field
Leveling the playing field
 
Windy City Rails - Layered Security
Windy City Rails - Layered SecurityWindy City Rails - Layered Security
Windy City Rails - Layered Security
 
Focus, SCNA 2011
Focus, SCNA 2011Focus, SCNA 2011
Focus, SCNA 2011
 
Repsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application SecurityRepsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application Security
 
Pontificating quantification
Pontificating quantificationPontificating quantification
Pontificating quantification
 
Clojure in the Field
Clojure in the FieldClojure in the Field
Clojure in the Field
 
The Art of the Spike
The Art of the SpikeThe Art of the Spike
The Art of the Spike
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

The Cost of Complexity