SlideShare a Scribd company logo
Copyright © 2015, Cigital
Cyber War, Cyber Peace, Stones,
and Glass Houses
…those who live in glass houses should not throw stones
@cigitalgem
Gary McGraw, Ph.D.
Chief Technology Officer
Copyright © 2015, Cigital
Cigital
• Providing software security professional services since
1992
• World’s premiere software security consulting firm
o 500 professional consultants
o Washington DC, New York, Santa Clara, Bloomington, Boston,
Chicago, Atlanta, Austin, Amsterdam, and London
• Recognized experts in software security
o Widely published in books, white papers, and articles
o Industry thought leaders
Copyright © 2015, CigitalCopyright © 2015, Cigital
Real Cyber Defense as Deterrence
• Defining “cyber”
whatever
• The offense problem
• “Active defense”
• Attribution
• Many vulnerabilities
• Payloads are easy
• Economics
• The NASCAR effect
• The defense solution
• Proactive defense vs.
cardboard defense
• Deterrence through
defense
• Build security in
Copyright © 2015, Cigital
CYBER CLARITY IS ELUSIVE
Separating the Threat from the Hype: What Washington Needs to Know
About Cyber Security, Nate Fick & Gary McGraw
http://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf
Copyright © 2015, CigitalCopyright © 2015, Cigital
Cyber Security
• How much of the cyber war talk is hype?
• What is real and what is cyber chimera?
Help policymakers find their
way through the fog and set
guidelines to protect the best of
the Internet and cyberspace,
both from those who seek to
harm it, and from those who
seek to protect it but risk doing
more harm than good.
Copyright © 2015, CigitalCopyright © 2015, Cigital
Disentangling War, Espionage, and Crime
• Cyber espionage
• Much more common than
war
• Wikileaks
• Anonymous
• Operation Aurora
• NY Times hack
• Bad compartmentalization
makes easy targets
• Cyber crime
• Even more common
• 1 trillion dollars per year?!
(just ask Ross Anderson)
Building systems properly
from a security
perspective will address
the cyber crime problem
just as well as it will
address cyber espionage
and cyber war. We can kill
all three birds with one
stone.
Copyright © 2015, CigitalCopyright © 2015, Cigital
Kinetic Impact as Decisive Criteria to be War
REALITY
• To qualify as cyber war, the
means may be virtual, but
the impact should be real.
• 1982 Soviet gas pipeline
explosion
• 2007 Israeli attack on Syrian
reactor
• 2008 Russia attacks Georgia two
ways
• 2008 USB drive infection in Iraq
(meh)
• 2010 Stuxnet attack on Iranian
centrifuges
HYPE
• Estonia dDoS attacks
• 2007 statue removal kerfuffle
• What would Google do?
• Brazilian blackout
• 2009 60 minutes story
• 100% hype
• China “hijacks” the Internet
• BGP mistake
• Bad design
Copyright © 2015, CigitalCopyright © 2015, Cigital
US: National Security Dominates
The real and perceived
dominance of the U.S.
national security
establishment in setting
cyber security policy is
problematic
• Cyber security is not only a
military problem
• Cyber security recognizes no
geographic boundaries
• Snowden revelations did not
help this situation
Copyright © 2015, CigitalCopyright © 2015, Cigital
Offense and Defense
defense means building
secure software, designing
and engineering systems to
be secure in the first place
and creating incentives and
rewards for systems that are
built to be secure
offense involves exploiting
systems, penetrating
systems with cyber attacks
and generally leveraging
broken software to
compromise entire systems
and systems of systems
Copyright © 2015, Cigital
THE OFFENSE PROBLEM
Copyright © 2015, CigitalCopyright © 2015, Cigital
“Active Defense”
Having a good offense is NOT
the same as a good defense.
Panetta on cyber security, “We
need to have the option to take
action against those who would
attack us.”
Grandma on security, “People
who live in glass houses should
not throw rocks.”
Copyright © 2015, CigitalCopyright © 2015, Cigital
Attribution Remains Unsolved (Ask Gandalf)
Copyright © 2015, CigitalCopyright © 2015, Cigital
Olympic Games & Stuxnet
• The PAYLOAD is what
matters
• Inject code into a running
control system
• Siemens SIMATIC PLC (step
7)
• Cyberwar!!
• Natanz in Iran
• Sophisticated, targeted
collection of malware
• Delivery
• 1 0day (not 4)
• Stolen private keys
• USB injection
• Network C&C
How to p0wn a Control System with Stuxnet (9/23/10)
http://bit.ly/RmbrNG
Copyright © 2015, CigitalCopyright © 2015, Cigital
Thread Hijacking in Online Games
• Used in early online game botting programs (circa
2004) but no longer
• Used successfully in Stuxnet in 2009
WoW.EXE
MAIN
THREAD
INJECTED
DLL
Loops hundreds of times per second
RenderWorld(..)
DETOUR PATCH
Copyright © 2015, CigitalCopyright © 2015, Cigital
INJECTED
CODE PAGE
complete
MAIN
THREAD
MAIN
THREAD
HARDWARE BP
RenderWorld(..)
uncloak
MSG
super
branch
RenderWorld(..)
recloak
restore
CastSpellByID( .. )
ScriptExecute( .. )
ClearTarget( .. )
MAIN
THREAD
Copyright © 2015, CigitalCopyright © 2015, Cigital
Vulnerabilities Are Pervasive
Copyright © 2015, Cigital
Disguise
Process Control
Process Disruption
deterministic
non-deterministic
(hacking)
Capability
atypical
Attack Complexity (From Ralph Langner)
http://bit.ly/TvWnuG
Copyright © 2015, CigitalCopyright © 2015, Cigital
Economics (From Ralph Langner)
Nuclear sub fleet
Stealth fighter jet fleet
Eurofighter fleet, Leopard II tank fleet
Cyber weapons program / MIL targets
Cyber weapons program / CI targets
$90B
$40B
$10B
$1B
$100M
Non-state thresholdhttp://bit.ly/TvWnuG
Singular cyber attack against
national critical infrastructure
$5M
Copyright © 2015, CigitalCopyright © 2015, Cigital
Offense is Sexy: The NASCAR Effect
Bad news
• The world would rather
not focus on how to build
stuff that does not break
• It’s harder to build good
stuff than to break junky
stuff
Good news
• The world loves to talk
about how stuff breaks
• This kind of work sparks
lots of interest in computer
security
Copyright © 2015, Cigital
THE DEFENSE SOLUTION
Copyright © 2015, Cigital
Cardboard Shield Defense
Today’s computer and
network security
mechanisms are like the
walls, moats, and
drawbridges of medieval
times. At one point, effective
for defending against isolated
attacks, mounted on
horseback. Unfortunately,
today’s attackers have
access to predator drones
and laser-guided missiles!
Copyright © 2015, CigitalCopyright © 2015, Cigital
Poor Security Engineering
Copyright © 2015, CigitalCopyright © 2015, Cigital
Proactive Defense
Secretary Panetta is mistaken:
“Through the innovative efforts
of our cyber-operators, we are
enhancing the department's
cyber-defense programs.
These systems rely on
sensors and software to hunt
down malicious code before it
harms our systems. We
actively share our own
experience defending our
systems with those running
the nation's critical private-
sector networks.”
• Security Engineering
• Software Security
• Build Security In
Copyright © 2015, Cigital
HOW TO BUILD SECURITY IN
Copyright © 2015, CigitalCopyright © 2015, Cigital
Software Security Touchpoints
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM: Software Security Measurement
• 104 firms measured (data freshness)
• BSIMM6 = data from 78 real initiatives
• 202 distinct measurements
• 26 over time (one firm 5 times)
• McGraw, Migues, and West
Copyright © 2015, CigitalCopyright © 2015, Cigital
78 Firms in BSIMM6 Community
Copyright © 2015, CigitalCopyright © 2015, Cigital
A Software Security Framework
See informIT article on BSIMM website http://bsimm.com
4 Domains 12 Practices
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM6 as a Measuring Stick
Copyright © 2015, CigitalCopyright © 2015, Cigital
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM6
Results
Top 12
activities
• purple =
good?
• red = bad?
“Blue shift” =
practices to
emphasize
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM By the Numbers
Copyright © 2015, CigitalCopyright © 2015, Cigital
Defense as Deterrent
“the U.S. is in a good
position to outspend its
adversaries on proactive
defense. Proactive
defense can be our
differentiator and a
serious deterrent to war.”
Proactive Defense
Prudent Alternative to
Cyberwarfare
http://t.co/2901DHVh
• A first strike in a cyber
war is unlikely to be
decisive
• No matter how much is
spent on cyber-offense,
cyber-defense must be
addressed anyway
• Proactive defense is a
very good differentiator
Copyright © 2015, CigitalCopyright © 2015, Cigital
Guidance for Policy Makers
• Focus on defense by
building security in
• Re-orient public private
partnerships
• Focus on information
users instead of
plumbing
• Let civilian agencies
lead
FIX THE BROKEN STUFF
Copyright © 2015, Cigital
WHERE TO LEARN MORE
Copyright © 2015, CigitalCopyright © 2015, Cigital
SearchSecurity + Cigital’s Security Blog
• No-nonsense monthly security
column by Gary McGraw:
www.searchsecurity.com
• In-depth thought-leadership blog from
the Cigital Principals:
• Gary McGraw
• Sammy Migues
• John Steven
• Paco Hope
• Jim DelGrosso
https://www.cigital.com/blog/
• Gary McGraw’s writings:
www.cigital.com/~gem/writing
Copyright © 2015, CigitalCopyright © 2015, Cigital
Silver Bullet + IEEE Security & Privacy
• Monthly Silver Bullet podcast with
Gary McGraw:
www.cigital.com/silverbullet
• IEEE Security & Privacy magazine
(Building Security In)
www.computer.org/security/bsisub/
Copyright © 2015, CigitalCopyright © 2015, Cigital
The Book
• How to DO software security
• Best practices
• Tools
• Knowledge
• Cornerstone of the Addison-
Wesley Software Security Series:
www.swsec.com
Copyright © 2015, CigitalCopyright © 2015, Cigital
Build Security In
• Join the BSIMM Community
http://bsimm.com
• Send e-mail: gem@cigital.com
• @cigitalgem

More Related Content

What's hot

Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Thanuja Seneviratne
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
IBM Security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ade Ismail Isnan
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Dinesh O Bareja
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
Rohit Srivastava
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Cyber security
Cyber security Cyber security
Cyber security
Samidha Gandhi
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Deepak Kumar (D3)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 

What's hot (19)

Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 

Viewers also liked

Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
Paige Rasid
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
Paige Rasid
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
Paige Rasid
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Paige Rasid
 
Overview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training ActivitiesOverview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training Activities
International Society of Service Innovation Professionals
 
NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50
David Sweigert
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technology
Ange Albertini
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Paige Rasid
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Paige Rasid
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011
Paige Rasid
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
Paige Rasid
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
n|u - The Open Security Community
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
Paige Rasid
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
Paige Rasid
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
Paige Rasid
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
Radware
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
Paige Rasid
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 

Viewers also liked (20)

Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Overview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training ActivitiesOverview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training Activities
 
NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technology
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Bab 3-ting-31
Bab 3-ting-31Bab 3-ting-31
Bab 3-ting-31
 

Similar to Cyber War, Cyber Peace, Stones and Glass Houses

Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
Cigital
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
jkl0202
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
Peter Wood
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1Clay Melugin
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
bmcmenemy
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
Jason Hong
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
Matthew Rosenquist
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
Cigital
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
asmeerana605
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
EhabRushdy1
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
Jean-Luc David
 

Similar to Cyber War, Cyber Peace, Stones and Glass Houses (20)

Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 

More from Paige Rasid

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
Paige Rasid
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Paige Rasid
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Paige Rasid
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
Paige Rasid
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30
Paige Rasid
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
Paige Rasid
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
Paige Rasid
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
Paige Rasid
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
Paige Rasid
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
Paige Rasid
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
Paige Rasid
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
Paige Rasid
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
Paige Rasid
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
Paige Rasid
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Paige Rasid
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
Paige Rasid
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Paige Rasid
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Paige Rasid
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Paige Rasid
 

More from Paige Rasid (19)

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar Series
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Cyber War, Cyber Peace, Stones and Glass Houses

  • 1. Copyright © 2015, Cigital Cyber War, Cyber Peace, Stones, and Glass Houses …those who live in glass houses should not throw stones @cigitalgem Gary McGraw, Ph.D. Chief Technology Officer
  • 2. Copyright © 2015, Cigital Cigital • Providing software security professional services since 1992 • World’s premiere software security consulting firm o 500 professional consultants o Washington DC, New York, Santa Clara, Bloomington, Boston, Chicago, Atlanta, Austin, Amsterdam, and London • Recognized experts in software security o Widely published in books, white papers, and articles o Industry thought leaders
  • 3. Copyright © 2015, CigitalCopyright © 2015, Cigital Real Cyber Defense as Deterrence • Defining “cyber” whatever • The offense problem • “Active defense” • Attribution • Many vulnerabilities • Payloads are easy • Economics • The NASCAR effect • The defense solution • Proactive defense vs. cardboard defense • Deterrence through defense • Build security in
  • 4. Copyright © 2015, Cigital CYBER CLARITY IS ELUSIVE Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security, Nate Fick & Gary McGraw http://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf
  • 5. Copyright © 2015, CigitalCopyright © 2015, Cigital Cyber Security • How much of the cyber war talk is hype? • What is real and what is cyber chimera? Help policymakers find their way through the fog and set guidelines to protect the best of the Internet and cyberspace, both from those who seek to harm it, and from those who seek to protect it but risk doing more harm than good.
  • 6. Copyright © 2015, CigitalCopyright © 2015, Cigital Disentangling War, Espionage, and Crime • Cyber espionage • Much more common than war • Wikileaks • Anonymous • Operation Aurora • NY Times hack • Bad compartmentalization makes easy targets • Cyber crime • Even more common • 1 trillion dollars per year?! (just ask Ross Anderson) Building systems properly from a security perspective will address the cyber crime problem just as well as it will address cyber espionage and cyber war. We can kill all three birds with one stone.
  • 7. Copyright © 2015, CigitalCopyright © 2015, Cigital Kinetic Impact as Decisive Criteria to be War REALITY • To qualify as cyber war, the means may be virtual, but the impact should be real. • 1982 Soviet gas pipeline explosion • 2007 Israeli attack on Syrian reactor • 2008 Russia attacks Georgia two ways • 2008 USB drive infection in Iraq (meh) • 2010 Stuxnet attack on Iranian centrifuges HYPE • Estonia dDoS attacks • 2007 statue removal kerfuffle • What would Google do? • Brazilian blackout • 2009 60 minutes story • 100% hype • China “hijacks” the Internet • BGP mistake • Bad design
  • 8. Copyright © 2015, CigitalCopyright © 2015, Cigital US: National Security Dominates The real and perceived dominance of the U.S. national security establishment in setting cyber security policy is problematic • Cyber security is not only a military problem • Cyber security recognizes no geographic boundaries • Snowden revelations did not help this situation
  • 9. Copyright © 2015, CigitalCopyright © 2015, Cigital Offense and Defense defense means building secure software, designing and engineering systems to be secure in the first place and creating incentives and rewards for systems that are built to be secure offense involves exploiting systems, penetrating systems with cyber attacks and generally leveraging broken software to compromise entire systems and systems of systems
  • 10. Copyright © 2015, Cigital THE OFFENSE PROBLEM
  • 11. Copyright © 2015, CigitalCopyright © 2015, Cigital “Active Defense” Having a good offense is NOT the same as a good defense. Panetta on cyber security, “We need to have the option to take action against those who would attack us.” Grandma on security, “People who live in glass houses should not throw rocks.”
  • 12. Copyright © 2015, CigitalCopyright © 2015, Cigital Attribution Remains Unsolved (Ask Gandalf)
  • 13. Copyright © 2015, CigitalCopyright © 2015, Cigital Olympic Games & Stuxnet • The PAYLOAD is what matters • Inject code into a running control system • Siemens SIMATIC PLC (step 7) • Cyberwar!! • Natanz in Iran • Sophisticated, targeted collection of malware • Delivery • 1 0day (not 4) • Stolen private keys • USB injection • Network C&C How to p0wn a Control System with Stuxnet (9/23/10) http://bit.ly/RmbrNG
  • 14. Copyright © 2015, CigitalCopyright © 2015, Cigital Thread Hijacking in Online Games • Used in early online game botting programs (circa 2004) but no longer • Used successfully in Stuxnet in 2009 WoW.EXE MAIN THREAD INJECTED DLL Loops hundreds of times per second RenderWorld(..) DETOUR PATCH
  • 15. Copyright © 2015, CigitalCopyright © 2015, Cigital INJECTED CODE PAGE complete MAIN THREAD MAIN THREAD HARDWARE BP RenderWorld(..) uncloak MSG super branch RenderWorld(..) recloak restore CastSpellByID( .. ) ScriptExecute( .. ) ClearTarget( .. ) MAIN THREAD
  • 16. Copyright © 2015, CigitalCopyright © 2015, Cigital Vulnerabilities Are Pervasive
  • 17. Copyright © 2015, Cigital Disguise Process Control Process Disruption deterministic non-deterministic (hacking) Capability atypical Attack Complexity (From Ralph Langner) http://bit.ly/TvWnuG
  • 18. Copyright © 2015, CigitalCopyright © 2015, Cigital Economics (From Ralph Langner) Nuclear sub fleet Stealth fighter jet fleet Eurofighter fleet, Leopard II tank fleet Cyber weapons program / MIL targets Cyber weapons program / CI targets $90B $40B $10B $1B $100M Non-state thresholdhttp://bit.ly/TvWnuG Singular cyber attack against national critical infrastructure $5M
  • 19. Copyright © 2015, CigitalCopyright © 2015, Cigital Offense is Sexy: The NASCAR Effect Bad news • The world would rather not focus on how to build stuff that does not break • It’s harder to build good stuff than to break junky stuff Good news • The world loves to talk about how stuff breaks • This kind of work sparks lots of interest in computer security
  • 20. Copyright © 2015, Cigital THE DEFENSE SOLUTION
  • 21. Copyright © 2015, Cigital Cardboard Shield Defense Today’s computer and network security mechanisms are like the walls, moats, and drawbridges of medieval times. At one point, effective for defending against isolated attacks, mounted on horseback. Unfortunately, today’s attackers have access to predator drones and laser-guided missiles!
  • 22. Copyright © 2015, CigitalCopyright © 2015, Cigital Poor Security Engineering
  • 23. Copyright © 2015, CigitalCopyright © 2015, Cigital Proactive Defense Secretary Panetta is mistaken: “Through the innovative efforts of our cyber-operators, we are enhancing the department's cyber-defense programs. These systems rely on sensors and software to hunt down malicious code before it harms our systems. We actively share our own experience defending our systems with those running the nation's critical private- sector networks.” • Security Engineering • Software Security • Build Security In
  • 24. Copyright © 2015, Cigital HOW TO BUILD SECURITY IN
  • 25. Copyright © 2015, CigitalCopyright © 2015, Cigital Software Security Touchpoints
  • 26. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM: Software Security Measurement • 104 firms measured (data freshness) • BSIMM6 = data from 78 real initiatives • 202 distinct measurements • 26 over time (one firm 5 times) • McGraw, Migues, and West
  • 27. Copyright © 2015, CigitalCopyright © 2015, Cigital 78 Firms in BSIMM6 Community
  • 28. Copyright © 2015, CigitalCopyright © 2015, Cigital A Software Security Framework See informIT article on BSIMM website http://bsimm.com 4 Domains 12 Practices
  • 29. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM6 as a Measuring Stick
  • 30. Copyright © 2015, CigitalCopyright © 2015, Cigital
  • 31. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM6 Results Top 12 activities • purple = good? • red = bad? “Blue shift” = practices to emphasize
  • 32. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM By the Numbers
  • 33. Copyright © 2015, CigitalCopyright © 2015, Cigital Defense as Deterrent “the U.S. is in a good position to outspend its adversaries on proactive defense. Proactive defense can be our differentiator and a serious deterrent to war.” Proactive Defense Prudent Alternative to Cyberwarfare http://t.co/2901DHVh • A first strike in a cyber war is unlikely to be decisive • No matter how much is spent on cyber-offense, cyber-defense must be addressed anyway • Proactive defense is a very good differentiator
  • 34. Copyright © 2015, CigitalCopyright © 2015, Cigital Guidance for Policy Makers • Focus on defense by building security in • Re-orient public private partnerships • Focus on information users instead of plumbing • Let civilian agencies lead FIX THE BROKEN STUFF
  • 35. Copyright © 2015, Cigital WHERE TO LEARN MORE
  • 36. Copyright © 2015, CigitalCopyright © 2015, Cigital SearchSecurity + Cigital’s Security Blog • No-nonsense monthly security column by Gary McGraw: www.searchsecurity.com • In-depth thought-leadership blog from the Cigital Principals: • Gary McGraw • Sammy Migues • John Steven • Paco Hope • Jim DelGrosso https://www.cigital.com/blog/ • Gary McGraw’s writings: www.cigital.com/~gem/writing
  • 37. Copyright © 2015, CigitalCopyright © 2015, Cigital Silver Bullet + IEEE Security & Privacy • Monthly Silver Bullet podcast with Gary McGraw: www.cigital.com/silverbullet • IEEE Security & Privacy magazine (Building Security In) www.computer.org/security/bsisub/
  • 38. Copyright © 2015, CigitalCopyright © 2015, Cigital The Book • How to DO software security • Best practices • Tools • Knowledge • Cornerstone of the Addison- Wesley Software Security Series: www.swsec.com
  • 39. Copyright © 2015, CigitalCopyright © 2015, Cigital Build Security In • Join the BSIMM Community http://bsimm.com • Send e-mail: gem@cigital.com • @cigitalgem