SlideShare a Scribd company logo
1 of 4
Download to read offline
Security agility - dynamic policy creation and
rollout
Have you ever thought of dynamic policy creation?
Not in a technical sense rather from an organisational
point of view.
The following example of a recent story is the perfect analogy for dynamic policy
creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were
presented with a heat wave. All over the news people where warned about the topic of
leaving your children or your pets in the car. Unfortunately there where fatalities due to
the practice of leaving small children in the car. There was a lot of talk but MediaMarkt
spun into action. This story has all the ingredients for future security (advanced
persistent threats) APT's and how you will have to deal with them. The same process'
will have to be applied to your policy framework.
Here the story and the ingredients that made it so worthy of mentioning.
The A frame with the new store policy.
The signs says: Dogs Welcome! Dear customers Dogs are welcome because of the
current temperatures which could be unbearable or even deadly for your animal even
if you have opened the windows of your car. Therefore Dogs are allowed due to this
temperatures.
The following table highlights the temperature development in a car by any give outside
temperature in dependence of time. This is not a scientific study and the values might
differ in your specific context or country. It is an illustration.
Outside
temperature
ºC and ºF
5 minutes 10 minutes 30 minutes 60 minutes
20ºC (68ºF) 24 ºC (75.2ºF) 27 ºC (80.6ºF) 36 ºC (96.8ºF) 46 ºC (114.8ºF)
22 ºC (71.6ºF) 26 ºC (78.8ºF) 29 ºC (84.2ºF) 38 ºC (100.4ºF) 48 ºC (118.4ºF)
24 ºC (75.2ºF) 28 ºC (82.4ºF) 31 ºC (87.8ºF) 40 ºC (104ºF) 50 ºC (122ºF)
26 ºC (78.8ºF) 30 ºC (86ºF) 33 ºC (91.4ºF) 42 ºC (107.6ºF) 52 ºC (125.6ºF)
28 ºC (82.4ºF) 32 ºC (89.4ºF) 35 ºC (95ºF) 44 ºC (111.2ºF) 54 ºC (129.6ºF)
30 ºC (86ºF) 34 ºC (93.2ºF) 37 ºC (98.6ºF) 46 ºC (114.8ºF) 56 ºC (132.2ºF)
32 ºC (89.6ºF) 36 ºC (96.8ºF) 39 ºC (102.2ºF) 48 ºC (118.4ºF) 58 ºC (136.4ºF)
34 ºC (93.2ºF) 38 ºC (100.4ºF) 41 ºC (105.8ºF) 50 ºC (122ºF) 60 ºC (140ºF)
36 ºC (96.8ºF) 40 ºC (104ºF) 43 ºC (109.4ºF) 52 ºC (125.6ºF) 62 ºC (143.6ºF)
38 ºC (100.4ºF) 42 ºC (107.6ºF) 45 ºC (113ºF) 54 ºC (129.2ºF) 64 ºC (147.2ºF)
40 ºC (104ºF) 44 ºC (111.2ºF) 47 ºC (116.6ºF) 56 ºC (132.2ºF) 68 ºC (154.4ºF)
Conversion ºF to ºC.
ºC * 1.8000 +32
This is the story!
So what? Nice story but what is the point aside from animal loving or caring for smallest
and most vulnerable in our community.
The exact same thought process applies to information security management. You are
maybe used to policy development based on an ISMS. There we say the public
information security policy should have an expected life span of 2-3 years. The more
detailed the policies go --> Server and Computer polices the more frequent they have
to chance and adapt to new technology for instance.
Now with the landscape of today's with APT's and risks emerging within hours or even
minutes all this has to happen much faster (like the dog policy). This is why I use the
dog policy analogy. Phishing for instance requires reaction times within minutes. A
phishing attack within an organisation requires you to act very swiftly. Experience
shows after the phishing email has entered your organisation some dude somewhere
will fall for it and either clicks on the payload (attached file) or the link in the email within
roughly 16 minutes. Yea right, and don't' forget this 24x7.
The Ingredients you need for dynamic policy creation (if a Dog store policy or a
phishing/ social engineering policy):
- Leadership (seeing the greater context of your environment and conclude what is in
the best interest for you as a company, for the ones around you (your customers) and
the ones your customers care about (their dogs or kids) for instance!
- Competence (acting within your competence or level of influence)
- Resources (what is at your hand)
- Flexible management (ability to convince others that you are on the right track, trust
in your skills and judgement)
- Drive to excel and deliver the best customer experience you can
What you do with these ingredients:
- Assess the situation (detect the problem)
- Understand the problem in a wider perspective (you clients problems)
- look for probable solutions (select the most promising one)
- Plan the necessary changes (Printing the posters for the A frames for
instance, distribute the posters to the locations, release a memo to the store
locations)
- Rollout/ implement the changes
- Monitor development (does the situation change, is there adjustment necessary)
- Correct if necessary
- Revert to normal operation
Your use case is of course not the dog of your client it’s his data. What have you done
today to make the data of your client more secure? Have you talked about APT's like
social engineering, phishing or any other security breaches? This is your dog.
Cheers Dom

More Related Content

Similar to Security agility- dynamic policy creation and rollout

New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environmentArthur Donkers
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)MeasureWorks
 
Devops for business : Efficiency & Innovation
Devops for business : Efficiency & InnovationDevops for business : Efficiency & Innovation
Devops for business : Efficiency & InnovationSatish Bhatia
 
Ml in a day v 1.1
Ml in a day v 1.1Ml in a day v 1.1
Ml in a day v 1.1CCG
 
Be a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product LeaderBe a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product LeaderProduct School
 
Domains and data analytics
Domains and data analyticsDomains and data analytics
Domains and data analyticsPratik Shukla
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
T eco mate-presentation
T eco mate-presentationT eco mate-presentation
T eco mate-presentationVishal Dave
 
Guerilla Change - Company Caboose
Guerilla Change - Company CabooseGuerilla Change - Company Caboose
Guerilla Change - Company CabooseTom Rijks
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product BacklogLuiz C. Parzianello
 
Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...Jon Hawes
 
Einstein Analytics Prediction Builder
Einstein Analytics Prediction BuilderEinstein Analytics Prediction Builder
Einstein Analytics Prediction Builderrikkehovgaard
 
Om0018 technology management
Om0018 technology managementOm0018 technology management
Om0018 technology managementconsult4solutions
 
Fantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl WeirFantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl WeirFuturice
 
Footfallcam Analysis
Footfallcam AnalysisFootfallcam Analysis
Footfallcam AnalysisFootfallCam
 

Similar to Security agility- dynamic policy creation and rollout (20)

Datawiz.io case study
Datawiz.io case studyDatawiz.io case study
Datawiz.io case study
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environment
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)
 
Devops for business : Efficiency & Innovation
Devops for business : Efficiency & InnovationDevops for business : Efficiency & Innovation
Devops for business : Efficiency & Innovation
 
Ml in a day v 1.1
Ml in a day v 1.1Ml in a day v 1.1
Ml in a day v 1.1
 
Be a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product LeaderBe a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product Leader
 
Domains and data analytics
Domains and data analyticsDomains and data analytics
Domains and data analytics
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
T eco mate-presentation
T eco mate-presentationT eco mate-presentation
T eco mate-presentation
 
Guerilla Change - Company Caboose
Guerilla Change - Company CabooseGuerilla Change - Company Caboose
Guerilla Change - Company Caboose
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
 
Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...
 
Einstein Analytics Prediction Builder
Einstein Analytics Prediction BuilderEinstein Analytics Prediction Builder
Einstein Analytics Prediction Builder
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Om0018 technology management
Om0018 technology managementOm0018 technology management
Om0018 technology management
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
 
Fantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl WeirFantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl Weir
 
Footfallcam Analysis
Footfallcam AnalysisFootfallcam Analysis
Footfallcam Analysis
 

More from Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.deReputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessReputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementReputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationReputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbReputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)Reputelligence
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1Reputelligence
 

More from Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 

Security agility- dynamic policy creation and rollout

  • 1. Security agility - dynamic policy creation and rollout Have you ever thought of dynamic policy creation? Not in a technical sense rather from an organisational point of view. The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT's and how you will have to deal with them. The same process' will have to be applied to your policy framework. Here the story and the ingredients that made it so worthy of mentioning. The A frame with the new store policy.
  • 2. The signs says: Dogs Welcome! Dear customers Dogs are welcome because of the current temperatures which could be unbearable or even deadly for your animal even if you have opened the windows of your car. Therefore Dogs are allowed due to this temperatures. The following table highlights the temperature development in a car by any give outside temperature in dependence of time. This is not a scientific study and the values might differ in your specific context or country. It is an illustration. Outside temperature ºC and ºF 5 minutes 10 minutes 30 minutes 60 minutes 20ºC (68ºF) 24 ºC (75.2ºF) 27 ºC (80.6ºF) 36 ºC (96.8ºF) 46 ºC (114.8ºF) 22 ºC (71.6ºF) 26 ºC (78.8ºF) 29 ºC (84.2ºF) 38 ºC (100.4ºF) 48 ºC (118.4ºF) 24 ºC (75.2ºF) 28 ºC (82.4ºF) 31 ºC (87.8ºF) 40 ºC (104ºF) 50 ºC (122ºF) 26 ºC (78.8ºF) 30 ºC (86ºF) 33 ºC (91.4ºF) 42 ºC (107.6ºF) 52 ºC (125.6ºF) 28 ºC (82.4ºF) 32 ºC (89.4ºF) 35 ºC (95ºF) 44 ºC (111.2ºF) 54 ºC (129.6ºF) 30 ºC (86ºF) 34 ºC (93.2ºF) 37 ºC (98.6ºF) 46 ºC (114.8ºF) 56 ºC (132.2ºF) 32 ºC (89.6ºF) 36 ºC (96.8ºF) 39 ºC (102.2ºF) 48 ºC (118.4ºF) 58 ºC (136.4ºF) 34 ºC (93.2ºF) 38 ºC (100.4ºF) 41 ºC (105.8ºF) 50 ºC (122ºF) 60 ºC (140ºF) 36 ºC (96.8ºF) 40 ºC (104ºF) 43 ºC (109.4ºF) 52 ºC (125.6ºF) 62 ºC (143.6ºF) 38 ºC (100.4ºF) 42 ºC (107.6ºF) 45 ºC (113ºF) 54 ºC (129.2ºF) 64 ºC (147.2ºF) 40 ºC (104ºF) 44 ºC (111.2ºF) 47 ºC (116.6ºF) 56 ºC (132.2ºF) 68 ºC (154.4ºF) Conversion ºF to ºC. ºC * 1.8000 +32 This is the story! So what? Nice story but what is the point aside from animal loving or caring for smallest and most vulnerable in our community.
  • 3. The exact same thought process applies to information security management. You are maybe used to policy development based on an ISMS. There we say the public information security policy should have an expected life span of 2-3 years. The more detailed the policies go --> Server and Computer polices the more frequent they have to chance and adapt to new technology for instance. Now with the landscape of today's with APT's and risks emerging within hours or even minutes all this has to happen much faster (like the dog policy). This is why I use the dog policy analogy. Phishing for instance requires reaction times within minutes. A phishing attack within an organisation requires you to act very swiftly. Experience shows after the phishing email has entered your organisation some dude somewhere will fall for it and either clicks on the payload (attached file) or the link in the email within roughly 16 minutes. Yea right, and don't' forget this 24x7. The Ingredients you need for dynamic policy creation (if a Dog store policy or a phishing/ social engineering policy): - Leadership (seeing the greater context of your environment and conclude what is in the best interest for you as a company, for the ones around you (your customers) and the ones your customers care about (their dogs or kids) for instance! - Competence (acting within your competence or level of influence) - Resources (what is at your hand) - Flexible management (ability to convince others that you are on the right track, trust in your skills and judgement) - Drive to excel and deliver the best customer experience you can What you do with these ingredients: - Assess the situation (detect the problem) - Understand the problem in a wider perspective (you clients problems) - look for probable solutions (select the most promising one)
  • 4. - Plan the necessary changes (Printing the posters for the A frames for instance, distribute the posters to the locations, release a memo to the store locations) - Rollout/ implement the changes - Monitor development (does the situation change, is there adjustment necessary) - Correct if necessary - Revert to normal operation Your use case is of course not the dog of your client it’s his data. What have you done today to make the data of your client more secure? Have you talked about APT's like social engineering, phishing or any other security breaches? This is your dog. Cheers Dom