Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done

NoNameCon
NoNameConNoNameCon
Eugene Pilyankevich
Chief Technical Officer, Cossack Labs
GETTING SECURE AGAINST CHALLENGES
OR
GETTING SECURITY CHALLENGES DONE
# whoami
(1997) -> #sprintnet, #x25zine, ru.nethack ;)
(2002) -> security & network engineer.
(2008) -> CTO in finance.
(2012) -> C*O in software dev company.
(2015) -> founder, CTO @ cossacklabs.com
Why security projects fail?
?
Problem 1
SOME STORIES TO START WITH
Finnish SNAFU
SOME STORIES TO START WITH
How to be smart and
fail miserably.
CONCLUSIONS?
CONCLUSIONS?
Clients are dumb!
CONCLUSIONS?
So are engineers!
Nope.
ROOT CAUSE?
VALUES.
ROOT CAUSE?
VALUES.
LANGUAGE.
ROOT CAUSE?
VALUES.
LANGUAGE.
REALITY MAPS.
ROOT CAUSE?
ROOT CAUSE –
ROOT CAUSE –
( )
ROOT CAUSE –
?
?
? ?
?
?
ROOT CAUSE –
?
?
?
?
?
?
?
?
?
ROOT CAUSE –
?
?
?
?
?
?
?
?
?


People frequently suck at 

making risk decisions under

pressure and uncertainty.
Problem 1
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Problem 2?
TWO MORE STORIES
Banking fraud prevention.
TWO MORE STORIES
Managing risk for real.
Business risk is the possibility a
company will have lower than
anticipated profits or experience 
a loss rather than taking a profit. 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Problem 2

If you’re in an ivory tower,

no one will bother listening.
Let’s take a closer look:
client.
TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

- FUD doesn’t work.

TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

- FUD doesn’t work.
- Speaking in business risk - helps.
TRY WALKING IN CLIENT’S SHOES
Auditing crypto libraries for fun and profit.
Domain-specific thinking
High-level complex skills do not distribute across
all behavior, and get reinforced locally.
FUD counteracts good decisions
Scaring customer who’s facing the unknown
leads to significant decrease in quality of
decision-making.
Double-layered risk aversion
Instead of mitigating technological risks (proper
risk aversion), people avoid making decisions
about technological risks they don’t understand.
Compliance and forget
Avoiding substance of compliance
to mitigate risks?
Quid faciam?
Let’s take a closer look:
supplier.
supplier client
Who has to cross the gap?
You are to cross the gap.
Misalignment and misunderstanding
is default state anyway.
You are to cross the gap.
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Own the problems
Ownership: example
Communicate risk properly
Communicate risk properly
Technical risk, financial impact.
Communicate risk properly
Technical risk, compliance impact.
Communicate risk properly
Process risks with business impact.
Communicate risk properly
Process risks with market impact.
Lead up the chain
Lead down the chain
Lead up the chain
Leadership: Example
It’s actually fun!
Examples: talk to your manager
Examples: talk to your customer
Examples
Manager is a passthru with process
lubrication capabilities, if you take
care of the hard details.
Examples.
Manager is pain in the ass, if you
don’t take care of technical details.
Examples are sad
Praxis.
Talk human.
- Docs & business materials.

Talk human.
- Docs & business materials.
- Talk to customers soon.
Take over processes.
- Self-learning processes.
- Reinforce ownership.
Love compliance.
- PCIDSS, HIPAA, oldschool.
- GDPR.
Avoiding domain specificity.
- Multi-skilled team.
- Boring smoothie tech is relevant.
Talk real risk.
Ain’t no fun unless you find it.
web: cossacklabs.com
mail: eugene@cossacklabs.com
Thank you.
1 of 69

Recommended

Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx by
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxInflectra
32 views46 slides
Agile Relevance in the age of Continuous Everything .... by
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Eturnti Consulting Pvt Ltd
192 views72 slides
The Technical Debt Trap - Michael "Doc" Norton by
The Technical Debt Trap - Michael "Doc" NortonThe Technical Debt Trap - Michael "Doc" Norton
The Technical Debt Trap - Michael "Doc" NortonLeanDog
4.6K views63 slides
Nationaal ICT Event 2010: Gilbert Silvius, Hogeschool Utrecht by
Nationaal ICT Event 2010: Gilbert Silvius, Hogeschool UtrechtNationaal ICT Event 2010: Gilbert Silvius, Hogeschool Utrecht
Nationaal ICT Event 2010: Gilbert Silvius, Hogeschool UtrechtFuturistBarbara.com
249 views29 slides
Risk management by
Risk managementRisk management
Risk managementDino Dini
1.5K views44 slides

More Related Content

Similar to Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done

Some experiences from early-stage Australian startups by
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startupsDavid Jones
705 views20 slides
Will there be an IT Risk Management 2.0? by
Will there be an IT Risk Management 2.0?Will there be an IT Risk Management 2.0?
Will there be an IT Risk Management 2.0?Luke O'Connor
308 views22 slides
How Product Managers Thrive in a DevOps World by
How Product Managers Thrive in a DevOps WorldHow Product Managers Thrive in a DevOps World
How Product Managers Thrive in a DevOps WorldAtlassian
19.2K views44 slides
A Product Manager's Place in a DevOps World by
A Product Manager's Place in a DevOps WorldA Product Manager's Place in a DevOps World
A Product Manager's Place in a DevOps WorldAtlassian
19.4K views71 slides
Opsec for security researchers by
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
1.7K views39 slides
Risk profiling by
Risk profilingRisk profiling
Risk profilingJaume Jornet Rivas
1.3K views94 slides

Similar to Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done(20)

Some experiences from early-stage Australian startups by David Jones
Some experiences from early-stage Australian startupsSome experiences from early-stage Australian startups
Some experiences from early-stage Australian startups
David Jones705 views
Will there be an IT Risk Management 2.0? by Luke O'Connor
Will there be an IT Risk Management 2.0?Will there be an IT Risk Management 2.0?
Will there be an IT Risk Management 2.0?
Luke O'Connor308 views
How Product Managers Thrive in a DevOps World by Atlassian
How Product Managers Thrive in a DevOps WorldHow Product Managers Thrive in a DevOps World
How Product Managers Thrive in a DevOps World
Atlassian19.2K views
A Product Manager's Place in a DevOps World by Atlassian
A Product Manager's Place in a DevOps WorldA Product Manager's Place in a DevOps World
A Product Manager's Place in a DevOps World
Atlassian19.4K views
Opsec for security researchers by vicenteDiaz_KL
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL1.7K views
Bilot 3mode by Bilot
Bilot 3modeBilot 3mode
Bilot 3mode
Bilot1.4K views
Ten lessons I painfully learnt while moving from software developer to entrep... by Wojciech Seliga
Ten lessons I painfully learnt while moving from software developer to entrep...Ten lessons I painfully learnt while moving from software developer to entrep...
Ten lessons I painfully learnt while moving from software developer to entrep...
Wojciech Seliga1K views
Product Management - pitfalls of Data Driven Development by Bartek Gatz
Product Management - pitfalls of Data Driven DevelopmentProduct Management - pitfalls of Data Driven Development
Product Management - pitfalls of Data Driven Development
Bartek Gatz281 views
Risk Management ProcessTraining Session Victor Allen.docx by SUBHI7
Risk Management ProcessTraining Session Victor Allen.docxRisk Management ProcessTraining Session Victor Allen.docx
Risk Management ProcessTraining Session Victor Allen.docx
SUBHI74 views
Being a professional software tester by Anton Keks
Being a professional software testerBeing a professional software tester
Being a professional software tester
Anton Keks4.5K views
insert narrationTitleCMIT 421 Section #Student Na by TatianaMajor22
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Na
TatianaMajor225 views
insert narrationTitleCMIT 421 Section #Student Na by LaticiaGrissomzz
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Na
Shift Left Security: Development Does Not Want to Own It. by Aggregage
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
Aggregage33 views
ISACA_21st century technologist by Donald Tabone
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
Donald Tabone146 views
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019 by Eturnti Consulting Pvt Ltd
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
How to manage technology obsolescence with LeanIX Enterprise Architecture Man... by LeanIX GmbH
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
LeanIX GmbH3.1K views
Operationalizing Machine Learning in the Enterprise by mark madsen
Operationalizing Machine Learning in the EnterpriseOperationalizing Machine Learning in the Enterprise
Operationalizing Machine Learning in the Enterprise
mark madsen756 views

More from NoNameCon

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van... by
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...NoNameCon
117 views72 slides
Anastasiia Vixentael – Encryption basics [NoName CyberKids] by
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]NoNameCon
221 views42 slides
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids] by
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]NoNameCon
551 views27 slides
Olha Pasko - Hunting fileless malware [workshop] by
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] NoNameCon
407 views33 slides
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro... by
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...NoNameCon
203 views64 slides
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії by
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїNoNameCon
215 views38 slides

More from NoNameCon(20)

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van... by NoNameCon
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
NoNameCon117 views
Anastasiia Vixentael – Encryption basics [NoName CyberKids] by NoNameCon
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
NoNameCon221 views
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids] by NoNameCon
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
NoNameCon551 views
Olha Pasko - Hunting fileless malware [workshop] by NoNameCon
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop]
NoNameCon407 views
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro... by NoNameCon
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
NoNameCon203 views
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії by NoNameCon
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
NoNameCon215 views
Artem Storozhuk - Search over encrypted records: from academic dreams to prod... by NoNameCon
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
NoNameCon144 views
Stephanie Vanroelen - Mobile Anti-Virus apps exposed by NoNameCon
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon233 views
Oksana Safronova - Will you detect it or not? How to check if security team i... by NoNameCon
Oksana Safronova - Will you detect it or not? How to check if security team i...Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...
NoNameCon171 views
Bert Heitink - 10 major steps for Cybersecurity by NoNameCon
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
NoNameCon164 views
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking by NoNameCon
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
NoNameCon151 views
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ... by NoNameCon
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon217 views
Pavlo Zhavoronkov - What is autumn like in prison camps? by NoNameCon
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
NoNameCon205 views
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that! by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
NoNameCon214 views
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ... by NoNameCon
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
NoNameCon199 views
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
NoNameCon153 views
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop by NoNameCon
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
NoNameCon60 views
Serhii Korolenko - Passing Security By by NoNameCon
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
NoNameCon313 views
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access by NoNameCon
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
NoNameCon95 views
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u... by NoNameCon
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
NoNameCon505 views

Recently uploaded

Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 views6 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
14 views16 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
58 views8 slides
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
25 views26 slides
SUPPLIER SOURCING.pptx by
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
16 views1 slide
Info Session November 2023.pdf by
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
13 views15 slides

Recently uploaded(20)

Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 views

Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done