SlideShare a Scribd company logo
Bad Advice
Unintended Consequences
and
Broken Paradigms:
Think and
Steve Werby
RVAs3c 2014
ActDifferent
1
Insanity
 Insanity [noun] in-ˈsa-nə-tē: Doing the same thing over and over again
and getting and expecting different results1
 s/Insanity/Information Security
21 Despite popular belief, there is no evidence that this was written or spoken by Albert Einstein
We’re Doing it Wrong
 Security == 0 || Security == 1
 Focus on vulnerabilities
 Think in terms of worst-case scenarios
 Serve as an obstacle
 Don't demonstrate value
 Point fingers
3
What Do You Mean By “We”?
He's talking
about me!
65%
I can relate to
some of this.
20%
Not me
[I'm delusional].
13%
My house
is in order!
2%
4
But Blame is Shared
How can we align with org’s objectives?
What do you think we should do?
What’s our risk for scenario I read
about?
Should we address this?
How can we prevent this in the future?
How did you let this happen!?
5
Who am I?
 I am not a rock star
6
Who am I?
 I am not a rock star
 I am not a guru
7
Who am I?
 I am not a rock star
 I am not a guru
 I am not a thought leader1
8
1 I am not belittlingly Chris Eng (pictured). I am a fan of the video he created, “How to Become an Information Security
Thought Leader”. https://www.youtube.com/watch?v=Pc64xWxRsag
Rules and Guidelines
9
Please hold questions until the end. I’ll also be
available after the talk.
It’s OK to laugh. Information security is tough
if you keep everything bottled up.
Constructive and unconstructive feedback welcome
at @stevewerby. And don’t forget hashtag #rvasec.
Disclaimer, Disavowal, and Renunciation
 These are not necessarily the views of
• My employer
• You
• Anyone else or anything else in the universe
 If your feelings are easily hurt by being told you've been doing it wrong,
consider leaving
• But you'll miss some ways of doing it better
 This disclaimer/disavowal/renunciation is retroactive to the Unix Epoch
• And is subject to change without notice
10
Bad Advice
11
Bad Advice
12
Bad Advice – Passwords
 Use unique passwords, memorize them, and change them regularly
 Bad
• Unique isn't actually what we want
• We don't really care if they memorize them
• Change them every 42 days
- Reason no longer applicable (offline brute force defense)
- Research doesn't even support that it's effective
13
Rules and Guidelines
14
Make it difficult and they will find a workaround!
Challenge the status quo!
Unintended Consequences
15
Unintended Consequences – Passwords
 Get entered into wrong system
 Ignore “requirements” and don't make them unique
 Write them down insecurely
 Unique, but other password give clues about this password
 Change regularly leads to (n+1)th similar to nth
16
Rules and Guidelines
17
Implement practical, palatable solutions!
Focus on outcomes!
Bad Advice – Long, Technical Policy
 Too looooooooooooooooooooooooooooooog
 Legal is happy, you may be happy
• Serves as a CYA and a violation lever
 Many never even consider reading it…but if they do
• Not easy to comprehend
• Impossible for users to retain
 Doesn’t consider impact on those affected
18
Rules and Guidelines
19
Challenge the status quo!
Build relationships and establish credibility!
Broken Paradigms
20
Broken Paradigm – Passwords, FW, OS Patching, AV
21
Passwords Firewalls
OS Patching Antivirus
22
? ?
? ?
Broken Paradigm – Passwords, FW, OS Patching, AV
Broken Paradigm – CIA Model
 Should be AIC
 Masquerades as a holistic security model, but is a limited model that
focuses entirely on information
 Parkerian Hexad better
• Adds possession, authenticity, availability
23
Werbian Quintet
Level 1
• Utility
• Availability
Level 2
• Integrity
Level 3
• Confidentiality/Possession
• Authenticity
24
Rules and Guidelines
25
Align with business needs!
Broken Paradigm – Vulnerability-Centric
 Unlocked, 20-year old, empty beaten up car in middle of full parking lot
 Unlocked house with $10MM in diamonds in the middle of the desert and
only 1 person knows it’s there
26
Rules and Guidelines
27
A vulnerability without an impact is not a risk!
A vulnerability without a threat is not a risk!
What Information Security Is (Allegedly)
 Information security is the practice of defending information against
unauthorized access, use, disclosure, modification, or destruction
28
What Information Security Is (Really)
 Information security is the defense of information and IT systems in
alignment with stakeholders' direction for addressing risk and
opportunities
29
What Information Security Is (Really)
 Information security is the defense of information and IT systems in
alignment with stakeholders' direction for addressing risk and
opportunities
 Breaking it Down
• What information do we have?
• What IT systems use it?
• Who are stakeholders?
• What are our risks?
• What are our opportunities?
30
Focus – From Chaos to Disorder
Phase 1
• Org mission and vision
• Org goals and success factors
Phase 2
• Essential business processes
• Secondary business processes
Phase 3
• Information
• IT systems
Phase 4
• Risks
• Opportunities
31
Rules and Guidelines
32
Start simple and enhance later!
Align with business needs!
What Risk Is
 R = Threat * Vulnerability * Impact
 R = Likelihood * Impact
• Can be range of impact/likelihood scenarios
• Likelihood of threat exploit vulnerability
resulting in impact
33
34
Risk Appetite[1 of 2]
35
 Expressing risk appetite
• Boundary on impact/likelihood grid
• Descriptive
- 99.9% manufacturing system uptime
- No social media account abuse
- No audit findings
• Maximum annual $ loss (bottom quartile
for industry)
 Can vary
• Across business units (R&D vs. marketing)
• By scenario (PII vs. IP, individual records vs. bulk loss)
Risk Appetite[2 of 2]
Level 1
• Infosec
Level 2
• IT leadership and IT support aligned with LOB
• Others who may have insights, even if lack authoritative knowledge
Level 3
• LOB management
• LOB leadership
Level 4
• Risk steering committee
• Enterprise leadership team or board
36
Rules and Guidelines
37
Take advantage of opportunities!
 Tool for infosec
 Adequate for explaining to stakeholders, though they care about impact
and likelihood, not threats and vulnerabilities
 Inefficient and illogical way of identifying risk though
Threat Model to Assess Risk[1 of 3]
38
Chart is a modified version of a chart in the OWASP Top 10 – 2013
(http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf)
 If likelihood of impact < acceptable, stop
 If likelihood of all threat actors < acceptable, stop
Threat Model to Assess Risk[2 of 3]
39
 Iteration 1 – Impact, threat actor, vulnerability and controls, attack vector
 Iteration 2 – Threat actor likelihood, likelihood of targeting vulnerability
(prevalence, discovery), attack vector likelihood (skills, resources)
 Iteration 3 – Determine risk
Threat Model to Assess Risk[3 of 3]
40
Assessing Risk
41
 Compare risk with risk appetite
 Make decisions based on comparison
• And cost/benefit analysis, constraints, and priorities
 Stakeholders
• Involve in process to the degree you can (worst case, inform)
 If risk < acceptable then accept residual risk
 Otherwise reduce, transfer (insure or contract/outsource), avoid (eliminate
situation or activity), ignore (head in sand)
 Use output to define current state, future state, and gaps
Rules and Guidelines
42
Start simple and enhance later!
Align with business needs!
Communicate current state, future state, and
gaps!
Broken Paradigm – Blinky Lights
 We neglect our existing blinky light technologies
• Functionality not enabled (functionality we aren’t even aware of)
 We neglect the data that is all around us
• Lots of chatty devices
• Many non-traditional sources
- Internal and external
- Electronic and non-electronic (including human)
43
Rules and Guidelines
44
Give people and processes appropriate
attention!
Maximize utilization of available resources!
Comparison of Controls
45
 We fail at this because we don’t align with business needs or the way the
business considers alternatives
Comparison of Risk Reduction Alternatives
Level 1
• Confidence in alternative (yours and theirs)
• Impact – risks and opportunities
Level 2
• User friction
• Management friction
Level 3
• Implementation and management burden, complexity, and timeframe
• Cost and cost avoidance
46
47
Passwords Firewalls
OS Patching Antivirus
Broken Paradigm – Passwords, FW, OS Patching, AV
48
One Time Passwords Anomaly Detection
Remove Java Malware Sandboxing
Broken Paradigm – Passwords, FW, OS Patching, AV
Comparing Controls
Control Confidence Risk Reduct User Friction Imp Burden Mgmt Burden Cost
Passwords 2 3 4 1 4 5
Firewalls 1 2 1 3 4 5
OS Patching 3 1 3 3 3 2
Antivirus 2 1 4 4 2 2
49
Control Confidence Risk Reduct User Friction Imp Burden Mgmt Burden Cost
OTP 4 4 4 2 2 2
Anomaly
Detection
2 3 3 5 5 5
Mitigate Java 5 5 1 2 1 1
Malware
Sandbox
3 3 2 2 3 3
[Think|Act] The Approach
 Focus on business needs, desired outcomes, capabilities
 Ask yourself and others lots of questions
 Challenge assumptions and recognize that needs, risks, and capabilities
evolve
50
[Think|Act] Different – Suggestions
51
Ask Yourself Questions
 Direction
• How much risk are data owners and function owners willing to accept?
• Am I meeting stakeholders’ expectations?
 Capabilities and outcomes
• How quickly are we containing incidents compared to a year ago?
• If the source and destination of an attack are within our data center, do we have
visibility?
• Is our manual effort to provide malware samples to our AV provider resulting in
subsequent blocking in our environment?
 Risk
• What percentage of critical vulnerabilities in our environment are exploited in the
wild before we remediate them?
• What if someone stole a laptop from an employee while he was using it?
52
[Think|Act] Different – Start *Somewhere*
 Where
• Easiest? Highest value? With person who raises hand? Opportunity arises?
• May not be your call
 Be prepared
• Incident in your environment
• Incident elsewhere
• Inquiry from stakeholder
 Crawl, walk, run – gain experience and learn lessons
53
[Think|Act] Different – Go Against the Grain
 Get a Mac campaigns from 2006 to 2009
 Higher the penetration of a technology or tool, the more likely it will be
targeted
• If you use tools with high penetration
- How quickly can your use of it be discovered?
- Do you have compensating controls?
- How quickly can you remediate vulnerabilities?
 Consider technologies, tools, and configurations that reduce exploitation
likelihood
54
[Think|Act] Different – Leave Echo Chamber
 Smart people in infosec, but <1% of workers
 Lots of smart people and great ideas elsewhere
 Regardless, your stakeholders should be determining what to protect, how
much, and sharing constraints and opportunities to align with
55
[Think|Act] Different – Leave Echo Chamber
56
Rules and Guidelines
57
Look outside of the echo chamber!
[Think|Act] Different – Security Awareness
 Define high-priority outcomes and focus on them
• Knowing what an incident is and what to do
 Make it personal and relevant – awareness of risk and influence behavior
• Password reuse can put our IP at risk and put your finances and private
communications at risk
• Loss of competitive advantage, loss of money, disclosure of private info
58
Rules and Guidelines
59
People don’t care about your data and systems!
Make it personal!
Your employees’ personal lives are not out of
scope to your adversaries!
Measure what matters!
[Think|Act] Different – Cloud and Mobile
 Remember how you felt about…
• workstation Internet access? laptops? public facing B2B web apps? thumb
drives? Bluetooth headsets? Skype?
This is kind of like that.
It’s coming.
You can’t stop it.
You shouldn’t stop it.
Better to ask “How might we enable the business and manage the risks?”
60
Rules and Guidelines
61
Do not say “You can’t” until you’ve asked “How
might we?”!
[Think|Act] Different – Applying It
62
[Think|Act] Different – Challenge Status Quo
 Ask why
• Why did we implement these controls?
• Have the risks changed?
• Have the controls changed?
• Have the requirements and assumptions changed?
• How might we do this better?
 Do this before you say “no”
63
[Think|Act] Different – Metrics
 Metrics should
• Describe outcomes, capabilities, or progress towards target state
• Answer questions or allow you to formulate new questions
• Be meaningful and actionable
 Not a metric
• Average days to patch vulnerability
• Number of people who opened communication about phishing
 Is a metric
• % of critical vulns patched after threshold, median days above threshold
• % responding to phishing emails broken down by whether or not read it
64
Rules and Guidelines
65
Measure what matters!
[Think|Act] Different – Signal vs Noise [1 of 2]
66
Noise
 Port scans from external source
 Horizontal brute force attacks
 Commodity attacks attempting to
leverage vulns which do not
appear in our environment
Signal
 Port scans from internal sources
 Diagonal brute force attacks
 Authentication attack ending in
successful login
 Authentication attempt, followed by
login, followed by abnormal action
 Atypical (or abnormal number of) file
accesses or downloads from content
repository
[Think|Act] Different – Signal vs Noise [2 of 2]
67
Rules and Guidelines
68
Understand your environment!
[Think|Act] Different – Equal Treatment
 Some people are riskier
• Based on system/data access
• Role/visibility
• Security hygiene
• Disgruntled/disciplined/separating
• Internet presence
 It’s OK to treat them differently
• Different training
• Different detective and preventive controls
• If a systems’ users are higher risk, so is the system (inherited risk)
69
70
[Think|Act] Different – Be the Adversary
 Your adversary likely doesn’t need an APT, so focus on commodity attack
vectors and exploits
 Your adversary doesn’t care that your public website in your DMZ (that’s
not quite the DMZ you thought) contains no sensitive data – he’ll consume
the local credentials and pivot his way throughout your soft gooey center
 Your adversary doesn’t care that CVSS rated 3 vulnerabilities in the same
system as 6s which was below your remediation threshold – three 6s
bundled in a $20 exploit kit are more of a risk than a theoretical 10 with no
known exploits in the wild
 The Chinese threat – your Chinese supplier may be an adversary; visits to
China could be dangerous but keep that in perspective
71
[Think|Act] Different – Password Composition
 Make it looooooooooooooooooooooooooooooog
 Disallow passwords utilizing common topologies1
 Require a Unicode character (~110,000 encoded)
721 KoreLogic Security Blog: Pathwell Topologies (https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies)
[Think|Act] Different – Measurement
 Measure security awareness – or it's not worth it. And an easy m/c quiz
immediately after watching training isn't the way.
 Select small # of people, ask them about knowledge of risk or desired behavior
 Train users
 Wait a month
 Select small # of people, ask them about knowledge of risk or desired behavior
 Don’t worry about statistical significance
 Walk your environment
 Unattended logged in computers, passwords in plain site, doors propped open, 2FA tokens
unattended, personal computers connected to network
 Talk to people – don’t have a game plan, just see what you can learn and teach
73
Rules and Guidelines
74
Understand your environment!
Build relationships and establish credibility!
Give people and processes appropriate
attention!
Fallacies
75
Fallacy – Security Through Obscurity
 Shouldn't be only control
 Valid approach as part of a group of controls
 Often highly effective against opportunistic attacks
• Can be effective against subset of targeted attacks
76
Fallacy – We Can’t Switch From IE
 Alleged reason – we have software that’s only compatible with it
 Install an alternate browser
• Only use IE for those web apps
• Install Chrome or Firefox with IE Tab extension
• Switch to alternate browser when attacks in the wild or in your environment
77
Fallacy – We Can’t Switch From IE
 Alleged reason – we have software that’s only compatible with it
 Install an alternate browser
• Only use IE for those web apps
• Install Chrome or Firefox with IE Tab extension
• Switch to alternate browser when attacks in the wild or in your environment
78
Fallacy – We Can’t Move to Prevent Mode
 Measure, analyze
 Use statistics to establish appropriate thresholds
 Table-top or simulate prevention
 Don’t try to boil the ocean (IPS, DLP, WAF, EMET, etc.)
 Present a well-thought out plan comparing current, near-term, and future
controls analysis
 Demonstrate success
 Repeat
 Build credibility
79
80
81
Fallacy – Best Practices
 Best Practice [adjective] ˈbest [noun] ˈprak-təs: Something that is done
regularly by so many people it acquires this designation, regardless of
effectiveness
82
Rules and Guidelines
83
Best practices are a unicorn! There’s only what
works and what doesn’t.
Fallacy – It’s Our Job To Say It’s Secure
 Security is a spectrum
 And depends on risk appetite
 Besides, remember what you said about…
• Full Disk Encryption?
• Salted MD5 passwords?
• SSL?
• TLS?
• 2-factor authentication?
• TrueCrypt?
84
Rules and Guidelines
85
Never say “It’s secure.” Say “The risk is low” or
“The risk is acceptable.”
Fallacy – Users are not Idiots and Fixing Stupid
 If users are idiots we are idiots too
 We often don’t eat our own dog food
 There are plenty of things we do that appear to be poor risk decisions to
subject matter experts from other fields
 Not everyone’s behavior can be changed, but we can do a lot better job of
influencing it
86
Big Takeaways
 Question “best practices” and challenge the status quo
 Beware of unintended consequences
 Bust broken paradigms
 Think and act different
87
Rules
88
Make it difficult and they will find a workaround!
A vulnerability without an impact is not a risk!
A vulnerability without a threat is not a risk!
Start simple and enhance later!
People don’t care about your data and systems! Make it personal!
Your employees’ personal lives are not out of scope to your adversaries!
Do not say “You can’t” until you’ve asked “How might we?”!
Never say “It’s secure.” Say “The risk is low” or “The risk is acceptable.”
Give people and processes appropriate attention.
Best practices are a unicorn! There’s only what works and what doesn’t.
Guiding Principles
89
Understand your environment
Implement practical, palatable solutions
Align with business needs
Communicate current state, future state, and gaps
Maximize utilization of available resources
Build relationships and establish credibility
Measure what matters
Challenge the status quo
Look outside of the echo chamber
Take advantage of opportunities
[PLACEHOLDER]
Bad Advice
Unintended Consequences
and
Broken Paradigms:
Think and
Steve Werby
RVAs3c 2014
ActDifferent
90
Questions? Discussion?
Find me later here or at @stevewerby.

More Related Content

What's hot

Application Assessment Metrics
Application Assessment MetricsApplication Assessment Metrics
Application Assessment Metrics
SensePost
 
One hundred rules for nasa project managers
One hundred rules for nasa project managersOne hundred rules for nasa project managers
One hundred rules for nasa project managers
Andreea Mocanu
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
tschraider
 
Session15
Session15Session15
Session15
Vincent Nestler
 
Security Differently - DevSecOps Days Austin 2019
Security Differently - DevSecOps Days Austin 2019Security Differently - DevSecOps Days Austin 2019
Security Differently - DevSecOps Days Austin 2019
Aaron Rinehart
 
ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020
Aaron Rinehart
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
AllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security DifferentlyAllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security Differently
Aaron Rinehart
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Red team vs Penetration Testing
Red team vs Penetration TestingRed team vs Penetration Testing
Red team vs Penetration Testing
avioren1979
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
Smart Assessment
 
Root Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective ActionsRoot Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective Actions
Hannah Stewart
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
NoNameCon
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
Tony Martin-Vegue
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
Vidyalankar Institute of Technology
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
Roger Johnston
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
CHI'07: Biases in Human Estimation of Interruptibility
CHI'07: Biases in Human Estimation of InterruptibilityCHI'07: Biases in Human Estimation of Interruptibility
CHI'07: Biases in Human Estimation of Interruptibility
cpt.positive
 
Threat modeling from the trenches to the clouds
Threat modeling from the trenches to the cloudsThreat modeling from the trenches to the clouds
Threat modeling from the trenches to the clouds
Priyanka Aash
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 

What's hot (20)

Application Assessment Metrics
Application Assessment MetricsApplication Assessment Metrics
Application Assessment Metrics
 
One hundred rules for nasa project managers
One hundred rules for nasa project managersOne hundred rules for nasa project managers
One hundred rules for nasa project managers
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Session15
Session15Session15
Session15
 
Security Differently - DevSecOps Days Austin 2019
Security Differently - DevSecOps Days Austin 2019Security Differently - DevSecOps Days Austin 2019
Security Differently - DevSecOps Days Austin 2019
 
ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
 
AllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security DifferentlyAllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security Differently
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
Red team vs Penetration Testing
Red team vs Penetration TestingRed team vs Penetration Testing
Red team vs Penetration Testing
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Root Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective ActionsRoot Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective Actions
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
CHI'07: Biases in Human Estimation of Interruptibility
CHI'07: Biases in Human Estimation of InterruptibilityCHI'07: Biases in Human Estimation of Interruptibility
CHI'07: Biases in Human Estimation of Interruptibility
 
Threat modeling from the trenches to the clouds
Threat modeling from the trenches to the cloudsThreat modeling from the trenches to the clouds
Threat modeling from the trenches to the clouds
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 

Similar to Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Different! [Presented by Steve Werby at RVAsec 2014]

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Steve Werby
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
AmitPandey388410
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
Ahmed Masud
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Capgemini
 
Assessing Your security
Assessing Your securityAssessing Your security
Управление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзииУправление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзии
Positive Hack Days
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
Allen Zhang
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
John Stauffacher
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
Jerod Brennen
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
Roger Grimes
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
SurfWatch Labs
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Napier University
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
Adrian Sanabria
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Ruth Edmonds
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
James Mulhern
 

Similar to Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Different! [Presented by Steve Werby at RVAsec 2014] (20)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Управление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзииУправление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзии
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 

More from Steve Werby

Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Steve Werby
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
Steve Werby
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Steve Werby
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Steve Werby
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
Steve Werby
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Steve Werby
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
Steve Werby
 

More from Steve Werby (7)

Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Different! [Presented by Steve Werby at RVAsec 2014]

  • 1. Bad Advice Unintended Consequences and Broken Paradigms: Think and Steve Werby RVAs3c 2014 ActDifferent 1
  • 2. Insanity  Insanity [noun] in-ˈsa-nə-tē: Doing the same thing over and over again and getting and expecting different results1  s/Insanity/Information Security 21 Despite popular belief, there is no evidence that this was written or spoken by Albert Einstein
  • 3. We’re Doing it Wrong  Security == 0 || Security == 1  Focus on vulnerabilities  Think in terms of worst-case scenarios  Serve as an obstacle  Don't demonstrate value  Point fingers 3
  • 4. What Do You Mean By “We”? He's talking about me! 65% I can relate to some of this. 20% Not me [I'm delusional]. 13% My house is in order! 2% 4
  • 5. But Blame is Shared How can we align with org’s objectives? What do you think we should do? What’s our risk for scenario I read about? Should we address this? How can we prevent this in the future? How did you let this happen!? 5
  • 6. Who am I?  I am not a rock star 6
  • 7. Who am I?  I am not a rock star  I am not a guru 7
  • 8. Who am I?  I am not a rock star  I am not a guru  I am not a thought leader1 8 1 I am not belittlingly Chris Eng (pictured). I am a fan of the video he created, “How to Become an Information Security Thought Leader”. https://www.youtube.com/watch?v=Pc64xWxRsag
  • 9. Rules and Guidelines 9 Please hold questions until the end. I’ll also be available after the talk. It’s OK to laugh. Information security is tough if you keep everything bottled up. Constructive and unconstructive feedback welcome at @stevewerby. And don’t forget hashtag #rvasec.
  • 10. Disclaimer, Disavowal, and Renunciation  These are not necessarily the views of • My employer • You • Anyone else or anything else in the universe  If your feelings are easily hurt by being told you've been doing it wrong, consider leaving • But you'll miss some ways of doing it better  This disclaimer/disavowal/renunciation is retroactive to the Unix Epoch • And is subject to change without notice 10
  • 13. Bad Advice – Passwords  Use unique passwords, memorize them, and change them regularly  Bad • Unique isn't actually what we want • We don't really care if they memorize them • Change them every 42 days - Reason no longer applicable (offline brute force defense) - Research doesn't even support that it's effective 13
  • 14. Rules and Guidelines 14 Make it difficult and they will find a workaround! Challenge the status quo!
  • 16. Unintended Consequences – Passwords  Get entered into wrong system  Ignore “requirements” and don't make them unique  Write them down insecurely  Unique, but other password give clues about this password  Change regularly leads to (n+1)th similar to nth 16
  • 17. Rules and Guidelines 17 Implement practical, palatable solutions! Focus on outcomes!
  • 18. Bad Advice – Long, Technical Policy  Too looooooooooooooooooooooooooooooog  Legal is happy, you may be happy • Serves as a CYA and a violation lever  Many never even consider reading it…but if they do • Not easy to comprehend • Impossible for users to retain  Doesn’t consider impact on those affected 18
  • 19. Rules and Guidelines 19 Challenge the status quo! Build relationships and establish credibility!
  • 21. Broken Paradigm – Passwords, FW, OS Patching, AV 21 Passwords Firewalls OS Patching Antivirus
  • 22. 22 ? ? ? ? Broken Paradigm – Passwords, FW, OS Patching, AV
  • 23. Broken Paradigm – CIA Model  Should be AIC  Masquerades as a holistic security model, but is a limited model that focuses entirely on information  Parkerian Hexad better • Adds possession, authenticity, availability 23
  • 24. Werbian Quintet Level 1 • Utility • Availability Level 2 • Integrity Level 3 • Confidentiality/Possession • Authenticity 24
  • 25. Rules and Guidelines 25 Align with business needs!
  • 26. Broken Paradigm – Vulnerability-Centric  Unlocked, 20-year old, empty beaten up car in middle of full parking lot  Unlocked house with $10MM in diamonds in the middle of the desert and only 1 person knows it’s there 26
  • 27. Rules and Guidelines 27 A vulnerability without an impact is not a risk! A vulnerability without a threat is not a risk!
  • 28. What Information Security Is (Allegedly)  Information security is the practice of defending information against unauthorized access, use, disclosure, modification, or destruction 28
  • 29. What Information Security Is (Really)  Information security is the defense of information and IT systems in alignment with stakeholders' direction for addressing risk and opportunities 29
  • 30. What Information Security Is (Really)  Information security is the defense of information and IT systems in alignment with stakeholders' direction for addressing risk and opportunities  Breaking it Down • What information do we have? • What IT systems use it? • Who are stakeholders? • What are our risks? • What are our opportunities? 30
  • 31. Focus – From Chaos to Disorder Phase 1 • Org mission and vision • Org goals and success factors Phase 2 • Essential business processes • Secondary business processes Phase 3 • Information • IT systems Phase 4 • Risks • Opportunities 31
  • 32. Rules and Guidelines 32 Start simple and enhance later! Align with business needs!
  • 33. What Risk Is  R = Threat * Vulnerability * Impact  R = Likelihood * Impact • Can be range of impact/likelihood scenarios • Likelihood of threat exploit vulnerability resulting in impact 33
  • 34. 34
  • 35. Risk Appetite[1 of 2] 35  Expressing risk appetite • Boundary on impact/likelihood grid • Descriptive - 99.9% manufacturing system uptime - No social media account abuse - No audit findings • Maximum annual $ loss (bottom quartile for industry)  Can vary • Across business units (R&D vs. marketing) • By scenario (PII vs. IP, individual records vs. bulk loss)
  • 36. Risk Appetite[2 of 2] Level 1 • Infosec Level 2 • IT leadership and IT support aligned with LOB • Others who may have insights, even if lack authoritative knowledge Level 3 • LOB management • LOB leadership Level 4 • Risk steering committee • Enterprise leadership team or board 36
  • 37. Rules and Guidelines 37 Take advantage of opportunities!
  • 38.  Tool for infosec  Adequate for explaining to stakeholders, though they care about impact and likelihood, not threats and vulnerabilities  Inefficient and illogical way of identifying risk though Threat Model to Assess Risk[1 of 3] 38 Chart is a modified version of a chart in the OWASP Top 10 – 2013 (http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf)
  • 39.  If likelihood of impact < acceptable, stop  If likelihood of all threat actors < acceptable, stop Threat Model to Assess Risk[2 of 3] 39
  • 40.  Iteration 1 – Impact, threat actor, vulnerability and controls, attack vector  Iteration 2 – Threat actor likelihood, likelihood of targeting vulnerability (prevalence, discovery), attack vector likelihood (skills, resources)  Iteration 3 – Determine risk Threat Model to Assess Risk[3 of 3] 40
  • 41. Assessing Risk 41  Compare risk with risk appetite  Make decisions based on comparison • And cost/benefit analysis, constraints, and priorities  Stakeholders • Involve in process to the degree you can (worst case, inform)  If risk < acceptable then accept residual risk  Otherwise reduce, transfer (insure or contract/outsource), avoid (eliminate situation or activity), ignore (head in sand)  Use output to define current state, future state, and gaps
  • 42. Rules and Guidelines 42 Start simple and enhance later! Align with business needs! Communicate current state, future state, and gaps!
  • 43. Broken Paradigm – Blinky Lights  We neglect our existing blinky light technologies • Functionality not enabled (functionality we aren’t even aware of)  We neglect the data that is all around us • Lots of chatty devices • Many non-traditional sources - Internal and external - Electronic and non-electronic (including human) 43
  • 44. Rules and Guidelines 44 Give people and processes appropriate attention! Maximize utilization of available resources!
  • 45. Comparison of Controls 45  We fail at this because we don’t align with business needs or the way the business considers alternatives
  • 46. Comparison of Risk Reduction Alternatives Level 1 • Confidence in alternative (yours and theirs) • Impact – risks and opportunities Level 2 • User friction • Management friction Level 3 • Implementation and management burden, complexity, and timeframe • Cost and cost avoidance 46
  • 47. 47 Passwords Firewalls OS Patching Antivirus Broken Paradigm – Passwords, FW, OS Patching, AV
  • 48. 48 One Time Passwords Anomaly Detection Remove Java Malware Sandboxing Broken Paradigm – Passwords, FW, OS Patching, AV
  • 49. Comparing Controls Control Confidence Risk Reduct User Friction Imp Burden Mgmt Burden Cost Passwords 2 3 4 1 4 5 Firewalls 1 2 1 3 4 5 OS Patching 3 1 3 3 3 2 Antivirus 2 1 4 4 2 2 49 Control Confidence Risk Reduct User Friction Imp Burden Mgmt Burden Cost OTP 4 4 4 2 2 2 Anomaly Detection 2 3 3 5 5 5 Mitigate Java 5 5 1 2 1 1 Malware Sandbox 3 3 2 2 3 3
  • 50. [Think|Act] The Approach  Focus on business needs, desired outcomes, capabilities  Ask yourself and others lots of questions  Challenge assumptions and recognize that needs, risks, and capabilities evolve 50
  • 51. [Think|Act] Different – Suggestions 51
  • 52. Ask Yourself Questions  Direction • How much risk are data owners and function owners willing to accept? • Am I meeting stakeholders’ expectations?  Capabilities and outcomes • How quickly are we containing incidents compared to a year ago? • If the source and destination of an attack are within our data center, do we have visibility? • Is our manual effort to provide malware samples to our AV provider resulting in subsequent blocking in our environment?  Risk • What percentage of critical vulnerabilities in our environment are exploited in the wild before we remediate them? • What if someone stole a laptop from an employee while he was using it? 52
  • 53. [Think|Act] Different – Start *Somewhere*  Where • Easiest? Highest value? With person who raises hand? Opportunity arises? • May not be your call  Be prepared • Incident in your environment • Incident elsewhere • Inquiry from stakeholder  Crawl, walk, run – gain experience and learn lessons 53
  • 54. [Think|Act] Different – Go Against the Grain  Get a Mac campaigns from 2006 to 2009  Higher the penetration of a technology or tool, the more likely it will be targeted • If you use tools with high penetration - How quickly can your use of it be discovered? - Do you have compensating controls? - How quickly can you remediate vulnerabilities?  Consider technologies, tools, and configurations that reduce exploitation likelihood 54
  • 55. [Think|Act] Different – Leave Echo Chamber  Smart people in infosec, but <1% of workers  Lots of smart people and great ideas elsewhere  Regardless, your stakeholders should be determining what to protect, how much, and sharing constraints and opportunities to align with 55
  • 56. [Think|Act] Different – Leave Echo Chamber 56
  • 57. Rules and Guidelines 57 Look outside of the echo chamber!
  • 58. [Think|Act] Different – Security Awareness  Define high-priority outcomes and focus on them • Knowing what an incident is and what to do  Make it personal and relevant – awareness of risk and influence behavior • Password reuse can put our IP at risk and put your finances and private communications at risk • Loss of competitive advantage, loss of money, disclosure of private info 58
  • 59. Rules and Guidelines 59 People don’t care about your data and systems! Make it personal! Your employees’ personal lives are not out of scope to your adversaries! Measure what matters!
  • 60. [Think|Act] Different – Cloud and Mobile  Remember how you felt about… • workstation Internet access? laptops? public facing B2B web apps? thumb drives? Bluetooth headsets? Skype? This is kind of like that. It’s coming. You can’t stop it. You shouldn’t stop it. Better to ask “How might we enable the business and manage the risks?” 60
  • 61. Rules and Guidelines 61 Do not say “You can’t” until you’ve asked “How might we?”!
  • 62. [Think|Act] Different – Applying It 62
  • 63. [Think|Act] Different – Challenge Status Quo  Ask why • Why did we implement these controls? • Have the risks changed? • Have the controls changed? • Have the requirements and assumptions changed? • How might we do this better?  Do this before you say “no” 63
  • 64. [Think|Act] Different – Metrics  Metrics should • Describe outcomes, capabilities, or progress towards target state • Answer questions or allow you to formulate new questions • Be meaningful and actionable  Not a metric • Average days to patch vulnerability • Number of people who opened communication about phishing  Is a metric • % of critical vulns patched after threshold, median days above threshold • % responding to phishing emails broken down by whether or not read it 64
  • 66. [Think|Act] Different – Signal vs Noise [1 of 2] 66 Noise  Port scans from external source  Horizontal brute force attacks  Commodity attacks attempting to leverage vulns which do not appear in our environment Signal  Port scans from internal sources  Diagonal brute force attacks  Authentication attack ending in successful login  Authentication attempt, followed by login, followed by abnormal action  Atypical (or abnormal number of) file accesses or downloads from content repository
  • 67. [Think|Act] Different – Signal vs Noise [2 of 2] 67
  • 69. [Think|Act] Different – Equal Treatment  Some people are riskier • Based on system/data access • Role/visibility • Security hygiene • Disgruntled/disciplined/separating • Internet presence  It’s OK to treat them differently • Different training • Different detective and preventive controls • If a systems’ users are higher risk, so is the system (inherited risk) 69
  • 70. 70
  • 71. [Think|Act] Different – Be the Adversary  Your adversary likely doesn’t need an APT, so focus on commodity attack vectors and exploits  Your adversary doesn’t care that your public website in your DMZ (that’s not quite the DMZ you thought) contains no sensitive data – he’ll consume the local credentials and pivot his way throughout your soft gooey center  Your adversary doesn’t care that CVSS rated 3 vulnerabilities in the same system as 6s which was below your remediation threshold – three 6s bundled in a $20 exploit kit are more of a risk than a theoretical 10 with no known exploits in the wild  The Chinese threat – your Chinese supplier may be an adversary; visits to China could be dangerous but keep that in perspective 71
  • 72. [Think|Act] Different – Password Composition  Make it looooooooooooooooooooooooooooooog  Disallow passwords utilizing common topologies1  Require a Unicode character (~110,000 encoded) 721 KoreLogic Security Blog: Pathwell Topologies (https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies)
  • 73. [Think|Act] Different – Measurement  Measure security awareness – or it's not worth it. And an easy m/c quiz immediately after watching training isn't the way.  Select small # of people, ask them about knowledge of risk or desired behavior  Train users  Wait a month  Select small # of people, ask them about knowledge of risk or desired behavior  Don’t worry about statistical significance  Walk your environment  Unattended logged in computers, passwords in plain site, doors propped open, 2FA tokens unattended, personal computers connected to network  Talk to people – don’t have a game plan, just see what you can learn and teach 73
  • 74. Rules and Guidelines 74 Understand your environment! Build relationships and establish credibility! Give people and processes appropriate attention!
  • 76. Fallacy – Security Through Obscurity  Shouldn't be only control  Valid approach as part of a group of controls  Often highly effective against opportunistic attacks • Can be effective against subset of targeted attacks 76
  • 77. Fallacy – We Can’t Switch From IE  Alleged reason – we have software that’s only compatible with it  Install an alternate browser • Only use IE for those web apps • Install Chrome or Firefox with IE Tab extension • Switch to alternate browser when attacks in the wild or in your environment 77
  • 78. Fallacy – We Can’t Switch From IE  Alleged reason – we have software that’s only compatible with it  Install an alternate browser • Only use IE for those web apps • Install Chrome or Firefox with IE Tab extension • Switch to alternate browser when attacks in the wild or in your environment 78
  • 79. Fallacy – We Can’t Move to Prevent Mode  Measure, analyze  Use statistics to establish appropriate thresholds  Table-top or simulate prevention  Don’t try to boil the ocean (IPS, DLP, WAF, EMET, etc.)  Present a well-thought out plan comparing current, near-term, and future controls analysis  Demonstrate success  Repeat  Build credibility 79
  • 80. 80
  • 81. 81
  • 82. Fallacy – Best Practices  Best Practice [adjective] ˈbest [noun] ˈprak-təs: Something that is done regularly by so many people it acquires this designation, regardless of effectiveness 82
  • 83. Rules and Guidelines 83 Best practices are a unicorn! There’s only what works and what doesn’t.
  • 84. Fallacy – It’s Our Job To Say It’s Secure  Security is a spectrum  And depends on risk appetite  Besides, remember what you said about… • Full Disk Encryption? • Salted MD5 passwords? • SSL? • TLS? • 2-factor authentication? • TrueCrypt? 84
  • 85. Rules and Guidelines 85 Never say “It’s secure.” Say “The risk is low” or “The risk is acceptable.”
  • 86. Fallacy – Users are not Idiots and Fixing Stupid  If users are idiots we are idiots too  We often don’t eat our own dog food  There are plenty of things we do that appear to be poor risk decisions to subject matter experts from other fields  Not everyone’s behavior can be changed, but we can do a lot better job of influencing it 86
  • 87. Big Takeaways  Question “best practices” and challenge the status quo  Beware of unintended consequences  Bust broken paradigms  Think and act different 87
  • 88. Rules 88 Make it difficult and they will find a workaround! A vulnerability without an impact is not a risk! A vulnerability without a threat is not a risk! Start simple and enhance later! People don’t care about your data and systems! Make it personal! Your employees’ personal lives are not out of scope to your adversaries! Do not say “You can’t” until you’ve asked “How might we?”! Never say “It’s secure.” Say “The risk is low” or “The risk is acceptable.” Give people and processes appropriate attention. Best practices are a unicorn! There’s only what works and what doesn’t.
  • 89. Guiding Principles 89 Understand your environment Implement practical, palatable solutions Align with business needs Communicate current state, future state, and gaps Maximize utilization of available resources Build relationships and establish credibility Measure what matters Challenge the status quo Look outside of the echo chamber Take advantage of opportunities [PLACEHOLDER]
  • 90. Bad Advice Unintended Consequences and Broken Paradigms: Think and Steve Werby RVAs3c 2014 ActDifferent 90 Questions? Discussion? Find me later here or at @stevewerby.