SlideShare a Scribd company logo
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
A Fistful of Fire Hoses:
Putting out Fires Without Crossing Streams
Steve Werby (@stevewerby)
Chief Information Security Officer
University of Texas at San Antonio
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
A Fistful of Fire Hoses:
Putting out Fires Without Crossing Streams
 AV
 FW
 IDS
 FIM
 SIEM
 Pen Test
 Config Mgmt
 IP Flow Mon
 Log Analysis
 Data Discovery
 Forensics
 Vuln Scanning 10 person department
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
One Size Does Not Fit All
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Obligatory Disclaimer
The opinions shared represent
my views, the views of my
employer, the views of my past
employers and the views of my
future employers.
Are presentation disclaimers REALLY
necessary?
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Obligatory Disclaimer
The opinions shared represent
my views, the views of my
employer, the views of my past
employers and the views of my
future employers.
Are presentation disclaimers REALLY
necessary?
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
My Org
 31k students
 6k FTEs
 155 classrooms
 65 labs
 1.5MM SQFT
 $450MM budget
 15k workstations
 1k servers
 /16
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
My Org
 Heterogeneous IT environment
 Silos
 Low visibility into state of IT security
 Inconsistent infosec risk mgmt & compliance
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Overview of Presentation
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Overview of Presentation
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Project Goals
 push(@manager, $info) => informed decisions
 push(@infosec, $info) => $visibility++
 Improve security posture of organization
 Change culture
 Facilitate standardization
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Development
 Project charter, steering committee, work plan
 Project team
 Project sponsor (CIO)
 Project manager from IT Project Mgmt
 CISO and several infosec staff
 IT App Development staff
 IT Marketing/Communications staff
 Pilot users
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Implementation
 Piloted
 while (1==1) communicate();
 Email and postcard marketing
 Presentations to key groups
 Started small
 Staged release phases
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Architecture
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Indicator Dashboard
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Indicator Summary
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Indicator Detail
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Indicator Detail #2
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Indicator Description
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Asset View
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
InSight – Exemption Request
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Reaction
☑ “How can we get all of our laptops encrypted?”
☑ “IT, fix it!”
☑ “I’m not going to look at it.”
☑ “Security is YOUR job. Why should I help do your job?
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Carrots and Sticks
 Peer pressure
 Eligibility for IT funding
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Project Goals Revisited
☑ push(@manager, $info) => informed decisions
☑ push(@infosec, $info) => $visibility++
☑ Improve security posture of organization
☑ Change culture
☑ Facilitate standardization
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Project Goals Revisited
☑ push(@manager, $info) => informed decisions
☑ push(@infosec, $info) => $visibility++
☑ Improve security posture of organization
☑ Change culture
☑ Facilitate standardization
 Additional impact
 Increased IT staff accountability
 Increased IT and infosec workload
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Lessons Learned
 process(“garbage”) = “garbage”
 Inventory, computer name, etc.
 A computer is…huh
 A laptop is a server
 Intended audience != actual audience
 Anticipate how app will be used
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
The Future
risk profiles
$awareness++
$scope++
$functionality++
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
The Future – $awareness++
 Monthly automated emails to managers
 Periodic reporting to governance groups
 Expand access to all employees
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
The Future - $scope++
 More endpoint devices
 Include servers and apps
 More data sources (IP Flow, SIEM, etc.)
 More granularity
 Information about people and processes
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
The Future - $functionality++
 Maintain historical information
 Increase update frequency
 Triggers
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
The Future – risk profiles
 By device, person, biz unit, system
Take the number of vehicles in the field, A), and
multiply it by the probable rate of failure, (B), then
multiply the result by the average out-of-court
settlement, (C). A times B times C equals X. If X
is less than the cost of a recall, we don't do one.
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Just Passing This On
Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby
Questions [Answers…Maybe]

More Related Content

Similar to A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presented by Steve Werby at ShmooCon 2012]

Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
Skycure
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Steve Werby
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
Joseph M Bradley
 
Analytics for Startups - Dublin Web Summit 2015
Analytics for Startups - Dublin Web Summit 2015Analytics for Startups - Dublin Web Summit 2015
Analytics for Startups - Dublin Web Summit 2015
Andy Young
 
Mobile can be a Goldmine
Mobile can be a GoldmineMobile can be a Goldmine
Mobile can be a Goldmine
Russell Lewis
 
Lean Product Analytics by Dan Olsen
Lean Product Analytics by Dan OlsenLean Product Analytics by Dan Olsen
Lean Product Analytics by Dan Olsen
Dan Olsen
 
Preparing for the Next Shellshock
Preparing for the Next ShellshockPreparing for the Next Shellshock
Preparing for the Next Shellshock
Threat Stack
 
Using Agile IRL with Big Customers
Using Agile IRL with Big CustomersUsing Agile IRL with Big Customers
Using Agile IRL with Big Customers
Alex Cowan
 
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
mysociety
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
Michael Davis
 
The Startup Owner's Manual
The Startup Owner's ManualThe Startup Owner's Manual
The Startup Owner's Manual
Pablo Rodriguez Bertorello
 
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
Alpen-Adria-Universität
 
APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014
Upside Energy Ltd
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
Skybox Security
 
Shaping the Future of Open Innovation
Shaping the Future of Open InnovationShaping the Future of Open Innovation
Shaping the Future of Open Innovation
Purdue RCODI
 
Bridging the Experience Gap - Bryan Lamkin
Bridging the Experience Gap - Bryan LamkinBridging the Experience Gap - Bryan Lamkin
Bridging the Experience Gap - Bryan Lamkin
scoopnewsgroup
 
[DSC Europe 22] On building a video recommendation system and other use-cases...
[DSC Europe 22] On building a video recommendation system and other use-cases...[DSC Europe 22] On building a video recommendation system and other use-cases...
[DSC Europe 22] On building a video recommendation system and other use-cases...
DataScienceConferenc1
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
Ray Bugg
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
International Institute for Learning
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 

Similar to A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presented by Steve Werby at ShmooCon 2012] (20)

Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
Analytics for Startups - Dublin Web Summit 2015
Analytics for Startups - Dublin Web Summit 2015Analytics for Startups - Dublin Web Summit 2015
Analytics for Startups - Dublin Web Summit 2015
 
Mobile can be a Goldmine
Mobile can be a GoldmineMobile can be a Goldmine
Mobile can be a Goldmine
 
Lean Product Analytics by Dan Olsen
Lean Product Analytics by Dan OlsenLean Product Analytics by Dan Olsen
Lean Product Analytics by Dan Olsen
 
Preparing for the Next Shellshock
Preparing for the Next ShellshockPreparing for the Next Shellshock
Preparing for the Next Shellshock
 
Using Agile IRL with Big Customers
Using Agile IRL with Big CustomersUsing Agile IRL with Big Customers
Using Agile IRL with Big Customers
 
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
The problem with impact measurement in Civic Tech (Matt Stempeck and Micah L....
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
The Startup Owner's Manual
The Startup Owner's ManualThe Startup Owner's Manual
The Startup Owner's Manual
 
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
Is One Second Enough? Evaluating QoE for Inter-Destination Multimedia Synchro...
 
APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Shaping the Future of Open Innovation
Shaping the Future of Open InnovationShaping the Future of Open Innovation
Shaping the Future of Open Innovation
 
Bridging the Experience Gap - Bryan Lamkin
Bridging the Experience Gap - Bryan LamkinBridging the Experience Gap - Bryan Lamkin
Bridging the Experience Gap - Bryan Lamkin
 
[DSC Europe 22] On building a video recommendation system and other use-cases...
[DSC Europe 22] On building a video recommendation system and other use-cases...[DSC Europe 22] On building a video recommendation system and other use-cases...
[DSC Europe 22] On building a video recommendation system and other use-cases...
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 

More from Steve Werby

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Steve Werby
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
Steve Werby
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Steve Werby
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Steve Werby
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Steve Werby
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
Steve Werby
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Steve Werby
 

More from Steve Werby (7)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 

A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presented by Steve Werby at ShmooCon 2012]

  • 1. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams Steve Werby (@stevewerby) Chief Information Security Officer University of Texas at San Antonio
  • 2. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams  AV  FW  IDS  FIM  SIEM  Pen Test  Config Mgmt  IP Flow Mon  Log Analysis  Data Discovery  Forensics  Vuln Scanning 10 person department
  • 3. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby One Size Does Not Fit All
  • 4. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Obligatory Disclaimer The opinions shared represent my views, the views of my employer, the views of my past employers and the views of my future employers. Are presentation disclaimers REALLY necessary?
  • 5. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Obligatory Disclaimer The opinions shared represent my views, the views of my employer, the views of my past employers and the views of my future employers. Are presentation disclaimers REALLY necessary?
  • 6. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby My Org  31k students  6k FTEs  155 classrooms  65 labs  1.5MM SQFT  $450MM budget  15k workstations  1k servers  /16
  • 7. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby My Org  Heterogeneous IT environment  Silos  Low visibility into state of IT security  Inconsistent infosec risk mgmt & compliance
  • 8. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Overview of Presentation
  • 9. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Overview of Presentation
  • 10. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Project Goals  push(@manager, $info) => informed decisions  push(@infosec, $info) => $visibility++  Improve security posture of organization  Change culture  Facilitate standardization
  • 11. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Development  Project charter, steering committee, work plan  Project team  Project sponsor (CIO)  Project manager from IT Project Mgmt  CISO and several infosec staff  IT App Development staff  IT Marketing/Communications staff  Pilot users
  • 12. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Implementation  Piloted  while (1==1) communicate();  Email and postcard marketing  Presentations to key groups  Started small  Staged release phases
  • 13. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Architecture
  • 14. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Indicator Dashboard
  • 15. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Indicator Summary
  • 16. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Indicator Detail
  • 17. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Indicator Detail #2
  • 18. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Indicator Description
  • 19. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Asset View
  • 20. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby InSight – Exemption Request
  • 21. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Reaction ☑ “How can we get all of our laptops encrypted?” ☑ “IT, fix it!” ☑ “I’m not going to look at it.” ☑ “Security is YOUR job. Why should I help do your job?
  • 22. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Carrots and Sticks  Peer pressure  Eligibility for IT funding
  • 23. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Project Goals Revisited ☑ push(@manager, $info) => informed decisions ☑ push(@infosec, $info) => $visibility++ ☑ Improve security posture of organization ☑ Change culture ☑ Facilitate standardization
  • 24. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Project Goals Revisited ☑ push(@manager, $info) => informed decisions ☑ push(@infosec, $info) => $visibility++ ☑ Improve security posture of organization ☑ Change culture ☑ Facilitate standardization  Additional impact  Increased IT staff accountability  Increased IT and infosec workload
  • 25. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Lessons Learned  process(“garbage”) = “garbage”  Inventory, computer name, etc.  A computer is…huh  A laptop is a server  Intended audience != actual audience  Anticipate how app will be used
  • 26. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby The Future risk profiles $awareness++ $scope++ $functionality++
  • 27. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby The Future – $awareness++  Monthly automated emails to managers  Periodic reporting to governance groups  Expand access to all employees
  • 28. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby The Future - $scope++  More endpoint devices  Include servers and apps  More data sources (IP Flow, SIEM, etc.)  More granularity  Information about people and processes
  • 29. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby The Future - $functionality++  Maintain historical information  Increase update frequency  Triggers
  • 30. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby The Future – risk profiles  By device, person, biz unit, system Take the number of vehicles in the field, A), and multiply it by the probable rate of failure, (B), then multiply the result by the average out-of-court settlement, (C). A times B times C equals X. If X is less than the cost of a recall, we don't do one.
  • 31. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Just Passing This On
  • 32. Steve Werby | ShmooCon 2012: A Fistful of Fire Hoses… | @stevewerby Questions [Answers…Maybe]