This ISSA Executive Roundtable will discuss various topics relevant to current threats against our Nation, our industries, our businesses, our customers, and us as individuals. This session will include topics around phishing / malware, emerging security strategies and standards, offshoring / third party risk management, incident responses around cloud technologies, personal privacy, and counter response tactics.
Esta apresentação mostra todas as funcionalidades do software RiskAdvisor Ouvidoria, que atende todas as exigências do Banco Central e otimiza a Gestão de Ouvidoria.
Esta apresentação mostra todas as funcionalidades do software RiskAdvisor Ouvidoria, que atende todas as exigências do Banco Central e otimiza a Gestão de Ouvidoria.
Detecting and Catching the Bad Guys Using Deception
Traditional controls are well known for their short comings in the face of modern cyber-attacks. Cyber security technologies will make use of signature based, behavioral, Next Generation capabilities or attempt to augment capabilities by leveraging cloud based or on premise cyber analytics warehouse and threat intelligence feeds via indicator of compromise (IOC) or other mechanisms. Although the later efforts have increased organizational cyber capabilities, they only do so with proper investments in people, process and technology. Additionally, as attackers adapt to defenses, these controls begin to experience decreasing marginal rates of defensive capability.
Deception programs, architectures and technologies endeavor to augment existing cyber security capabilities through the use of honeypots or honey net (decoys) or breadcrumbs or broken glass (deceptions).
Advanced deception technologies are differentiated by the use of distributed deception technology which features agentless, simple deployment capabilities with lightweight deceptions that leverage operating system objects deceive attackers into triggering alerts. Normal users would never trigger the deceptions as an attacker would, resulting in high fidelity alerting with near-zero false positives. Such technology consequently serves to not only augment cyber security capabilities post-breach but provides a new, highly effective post-breach cyber security capability along with precise real-time forensics.
James Muren is a strategist and delivers workshops in cyber security strategy, GRC and security architecture that are used to develop long-term strategies and tactical roadmaps for customers that addresses security for legacy and cloud architectures. As a strategic management consultant and having built fully capable cyber programs in the past, he helps mentor and lead teams for programs & projects in information technology & cyber security. James is primarily focused on the business benefits of cyber security, and the demonstration of those benefits through metrics that can be quickly communicated to executive leadership. By properly integrating security controls within a regulatory and policy context, security programs such as breach and incident response, data governance, forensics, etc. can properly demonstrate value, receive proper investment and adequately secure organizations.
James is also a researcher. His areas of research include: Continuous GRC, cyber analytics, Trusted Computing Group (TCG), Security Automation, Hardware & Software Security, ICS, SCADA, IOT, Malware Research, Full System Security Design Lifecycle and Leap Ahead technology.
Intellectual Property Protection―
Cross Roads between Ethics, Information Security, and Internal Audit
Richard (Rick) Brunner has more than 40 years experience in information security and technology, specializing in secure systems/application design and development, system architectures, information risks and controls, testing, and strategy and program management. Rick’s past assignment was as an Assistant Vice President, Security Strategy and Architecture at GM Financial and has worked in Healthcare, Finance, Human Resources, Military, and Intelligence. Rick has 32 years of military service, both active and reserves, rising to the rank of Colonel (0-6). He holds an Executive Jurist Doctorate degree, concentration in Law and Technology from Concord Law School; Master of Science degree in Computer Science, concentration in Information Systems Security from James Madison University; and a Bachelor of Science degree in Mathematics and Computer Science from University of Texas at San Antonio. Rick is an Assistant Faculty member at Collin College, instructing courses in their cyber security program and is an active member of Collin’s Cyber Security Advisory Board. Rick holds the following certifications:
• Certified Information Systems Security Professional (CISSP) (Certification Number: 375658)
• SABSA Chartered Security Architect - Foundation Certificate (SCF) (License SCF14020703)
• ITIL Foundation Certificate in IT Service Management (Certification Number: 37823)
Layered Security / Defense in Depth
One area that I have found that even seasoned security professionals have a problem with articulating is layered security (defense in depth). Most are familiar with their area of expertise (servers, networks, pen testing, etc.), but have never viewed security as a heterogeneous process. In my presentation I use a layered diagram to highlight what controls are in what layers, what controls interact across layers, and what a complete layered security model would look like vs. what a more typical company security model does look like.
Nathan Shepard
CISSP, CISM, CRISC, CISA
33 Years in IT.
21 Years in Information Security.
Information Security consulting at the corporate governance level.
Information Security management for outsourced InfoSec delivery.
Detecting and Catching the Bad Guys Using Deception
Traditional controls are well known for their short comings in the face of modern cyber-attacks. Cyber security technologies will make use of signature based, behavioral, Next Generation capabilities or attempt to augment capabilities by leveraging cloud based or on premise cyber analytics warehouse and threat intelligence feeds via indicator of compromise (IOC) or other mechanisms. Although the later efforts have increased organizational cyber capabilities, they only do so with proper investments in people, process and technology. Additionally, as attackers adapt to defenses, these controls begin to experience decreasing marginal rates of defensive capability.
Deception programs, architectures and technologies endeavor to augment existing cyber security capabilities through the use of honeypots or honey net (decoys) or breadcrumbs or broken glass (deceptions).
Advanced deception technologies are differentiated by the use of distributed deception technology which features agentless, simple deployment capabilities with lightweight deceptions that leverage operating system objects deceive attackers into triggering alerts. Normal users would never trigger the deceptions as an attacker would, resulting in high fidelity alerting with near-zero false positives. Such technology consequently serves to not only augment cyber security capabilities post-breach but provides a new, highly effective post-breach cyber security capability along with precise real-time forensics.
James Muren is a strategist and delivers workshops in cyber security strategy, GRC and security architecture that are used to develop long-term strategies and tactical roadmaps for customers that addresses security for legacy and cloud architectures. As a strategic management consultant and having built fully capable cyber programs in the past, he helps mentor and lead teams for programs & projects in information technology & cyber security. James is primarily focused on the business benefits of cyber security, and the demonstration of those benefits through metrics that can be quickly communicated to executive leadership. By properly integrating security controls within a regulatory and policy context, security programs such as breach and incident response, data governance, forensics, etc. can properly demonstrate value, receive proper investment and adequately secure organizations.
James is also a researcher. His areas of research include: Continuous GRC, cyber analytics, Trusted Computing Group (TCG), Security Automation, Hardware & Software Security, ICS, SCADA, IOT, Malware Research, Full System Security Design Lifecycle and Leap Ahead technology.
Intellectual Property Protection―
Cross Roads between Ethics, Information Security, and Internal Audit
Richard (Rick) Brunner has more than 40 years experience in information security and technology, specializing in secure systems/application design and development, system architectures, information risks and controls, testing, and strategy and program management. Rick’s past assignment was as an Assistant Vice President, Security Strategy and Architecture at GM Financial and has worked in Healthcare, Finance, Human Resources, Military, and Intelligence. Rick has 32 years of military service, both active and reserves, rising to the rank of Colonel (0-6). He holds an Executive Jurist Doctorate degree, concentration in Law and Technology from Concord Law School; Master of Science degree in Computer Science, concentration in Information Systems Security from James Madison University; and a Bachelor of Science degree in Mathematics and Computer Science from University of Texas at San Antonio. Rick is an Assistant Faculty member at Collin College, instructing courses in their cyber security program and is an active member of Collin’s Cyber Security Advisory Board. Rick holds the following certifications:
• Certified Information Systems Security Professional (CISSP) (Certification Number: 375658)
• SABSA Chartered Security Architect - Foundation Certificate (SCF) (License SCF14020703)
• ITIL Foundation Certificate in IT Service Management (Certification Number: 37823)
Layered Security / Defense in Depth
One area that I have found that even seasoned security professionals have a problem with articulating is layered security (defense in depth). Most are familiar with their area of expertise (servers, networks, pen testing, etc.), but have never viewed security as a heterogeneous process. In my presentation I use a layered diagram to highlight what controls are in what layers, what controls interact across layers, and what a complete layered security model would look like vs. what a more typical company security model does look like.
Nathan Shepard
CISSP, CISM, CRISC, CISA
33 Years in IT.
21 Years in Information Security.
Information Security consulting at the corporate governance level.
Information Security management for outsourced InfoSec delivery.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
María Carolina Martínez - eCommerce Day Colombia 2024
Luncheon 2015-05-21 - CISO Roundtable by David Stanton
1. 1
North Texas ISSA CISO Roundtable
Moderator and Panelists
David Stanton (Moderator) – ISSA Executive Forums Director
Chris Ray (Panelist) – CISO, Epsilon
Parrish Gunnels (Panelist) – CISO, Invitation Homes
Ron Mehring (Panelist) – CISO, Texas Health Resources
Roundtable Topic
Threat Against Our Well Being – The Most Effective Methods in Combating and Responding to the Cyber Attack
Objective
This ISSA Executive Roundtable will discuss various topics relevant to current threats against our Nation, our industries,
our businesses, our customers, and us as individuals. This session will include topics around phishing / malware,
emerging security strategies and standards, offshoring / third party risk management, incident responses around cloud
technologies, personal privacy, and counter response tactics.
Event Sponsor
2. 2
CISO Roundtable – Agenda and Topics
• Chapter Announcements (5 – 10 minutes)
• Roundtable Introductions (5 – 10 minutes)
• Topics (80 minutes)
o Current cyber threats against our organizations (Anthem, Sony, Target, Home
Depot, etc.)
o Various methods for reducing exposure to these threats
o Attacks against us as individuals
o Protecting and tracking sensitive data
o Emerging technologies demanded by the business (BYOD, Cloud Services,
etc.)
• Questions from the Audience (5 – 10 minutes)
• Closing and Drawings
3. 3
About Me
David Stanton, ISSA Executive Forum Director, Security & Privacy Director at Protiviti,
and regularly acting in senior security roles for various clients (Moderator)
David has more than 16 years of IT and IT Security consulting experience and received a BBA in
Managerial Information Systems from Baylor University. He joined the Protiviti Dallas office in the IT
Consulting practice focusing on Security and Privacy in 2013. Prior to Protiviti, David held the
position of Data Protection and Privacy lead for a Fortune Global 500 consulting firm, acted as an
interim Chief Information Security for a large entertainment company, and was previously Information
Security Officer (ISO) for a top 5 US credit union. Currently, David is also the ISSA Executive
Forums Director, is the senior security leader for a local Healthcare Provider, and regularly speaks to
large audiences around top of mind security topics (including Cloud Security, Third Party Risk
Management Forensics / Incident Handling, and Cyber Threats).
Powerful Insights. Proven Delivery.™
Phone: +1.214.850.7051
david.stanton@protiviti.com
David Stanton
Director, Security and Privacy
Dallas, TX
4. 4
Risk Consulting & Advisory
Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance,
technology, operations, governance, risk, and internal audit. Through our network of more than 70 offices
in over 20 countries, we have served more than 35 percent of FORTUNE® 1000 and Global 500
companies. We also work with smaller, growing companies, large multi-national corporations, as well as
with educational institutions and government agencies.
Protiviti – Who we are
e
Embedded
Internal ControlProgram and Project
Management
Managing
Applications
Managing the
Business of IT
IT Security
Business and Finance
Operations
Improvement
Strategic and
Operational Risk
Internal Audit
Sourcing &
Consulting
Restructuring &
Financing
Forecasting &
Business Planning
IT
Consulting
Governance,
Risk & Audit
Regulatory
Compliance
Finance &
Performance
Integrated
Performance & Risk
Management
We help clients improve
performance and manage risks.
We believe in combining business
insight and entrepreneurial spirit
with experience and pragmatism.
Now more than ever, this
combination is essential for
growing value whilst retaining
control.
6. 6
Cyber Attacks describes the recent surge of internet
sourced attacks focusing on effecting business
operations, causing reputation harm, degrading
eCommerce, stealing digital assets, and espionage
against foreign entities.
Usually these attack motivators are driven by
financial, political, reputational, and personal
interests in creating physical or logical harm.
Rule of Thumb – What is important to you or to your
company is likely of value to and target of someone else.
What are Cyber Attacks?
8. 8
11%
8%
11%
34%
25%
0% 5% 10% 15% 20% 25% 30% 35% 40%
Manufacturing, Transportation, and Utilities
Information and Professional Services Firms
Retail Environments
Financial Institutions
Larger Organizations
Who are the victims?
Source: 2014 Verizon Data Breach Investigations Report, State of Cybersecurity: Implications for 2015
11%
31%
13%
55%
88%
2%
0% 20% 40% 60% 80% 100%
Priviledged Misuse and Abuse
Social Tactics
Physical Attacks
Malware
Hacking
Error
How the breaches occur?
Who did they get and how?
9. 9
1%
7%
13%
18%
90%
0% 20% 40% 60% 80% 100%
Business Partners
Multiple Parties
Insiders
State-affiliated Actors
Outsiders
Who is the attacker ?
External (Trend)
Internal (Trend)
Partner (Trend)
Source: 2014 Verizon Data Breach Investigations Report, State of Cybersecurity: Implications for 2015
78% 72%
86%
98% 92% 95%
39%
48%
12%
4%
14% 12%6% 6%
2% 1% 1%
-20%
0%
20%
40%
60%
80%
100%
2008 2009 2010 2011 2012 2013
What is the trends of attacker?
Who is after us and Why?
10. 10
Monitor – Build capabilities that identify anomalies
quickly and accurately. Establish a baseline.
Protect – Build a set of layers to protect infrastructure
based upon risk.
Resilient – Build elastic and flexible capabilities that
can compensate for each other and adapt to new
threats.
Awareness – Improve internal and external awareness
around capabilities. Being smart about what you share
externally.
Monitor
ProtectResilient
Awareness
How to Respond?
11. 11
Parrish Gunnels, Sr. Director and CISO of Information Security at Invitation Homes
Parrish has more than 16 years of IT experience in various functions such as business analysis, project management, development, policy and
process creation, business continuity management, internal / external audit, risk management and information security. He joined Invitation Homes,
a Blackstone company, in February of this year. His experience includes working in multiple industries including financial services,
telecommunications, and chemical manufacturing. Over the past few years, he has been focused on developing information security programs and
securing existing networks through risk analysis, control definition, and user experience. Parrish holds a Master’s of Business Administration from
Texas Christian University and certifications as a Professional Project Manager (PMP), Certified Information Systems Auditor (CISA), Certified in Risk
and Information Systems Control (CRISC), and Certified Information Systems Security Professional (CISSP).
Chris Ray, SVP and CISO at Epsilon, Inc.
Since November 2011 and as CISO of Epsilon, Chris oversees many facets of information security, including security operations, incident response,
identity management and regulatory compliance. Prior to Epsilon, Chris was the CISO at Aflac Corporation for 7½ years and responsible for
Information Security and Software Change Management. He also started and oversaw the first infosec department at Healthsouth Corporation.
Finally, Chris served as an active duty United States Air Force (USAF) enlisted airman and then officer for 13 years with another 8 years in the active
USAF Reserves. He retired in 2009 after 21 years of service. For over a decade, he worked at the Air Force Information Warfare Center conducting
global cyber-warfare and cyber-terrorism exercises to provide government agencies information warfare tactics, techniques and procedures. Chris
holds a BS in Computer Science from the University of Texas at Austin and a CISSP (Certified Information Systems Security Professional)
certification as well as an ISSMP concentration in management.
Ron Mehring, Sr. Director and CISO of Information Security at Texas Health Resources
Ron Mehring serves as the chief information security officer / senior director, information security for Texas Health Resources, one of the largest
faith-based, nonprofit health care delivery systems in the United States. At Texas health Resources, Ron leads IT GRC, security architecture,
security operations, and the IT BC DR program. His current initiatives are focused on improving team performance, improving resiliency
management, integrating a threat-management architecture that accounts for present and emerging threats, and maturing a technology risk
management program that is aligned with the strategic goals of the organization. Ron holds an MBA in Risk Management from NYIT and is a
Certified Information Systems Security Professional (CISSP).
About Our Panelists