SlideShare a Scribd company logo
1 of 15
Detect & Respond
Frode Hommedal
Technical Director
PwC.no/Cyber
ISF – August 2019
10 common pit
that will sabotage the effectiveness
of your security program
Frode Hommedal – PwC.no/Cyber
When designing a
strategy for detection
and response there are
numerous pitfalls you
can fall into.
This presentation will
highlight some of them.
[Based on my own experience and discussions with peers]
DateDetect & Respond: 10 common pitfalls
2
Frode Hommedal – PwC.no/Cyber
If you fall into too many
of these, your security
program will likely be
ineffective at protecting
your organization from
internal and external
threats.
Frode Hommedal – PwC.no/Cyber
#whoami
Technical analyst turned
strategic advisor within
the field of detection and
response and … security.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Risk comes from not
knowing what you're
doing.– Warren Buffett
Pitfall #1
Guessing risk, not basing
it on asset valuation and
threat and vulnerability
assessments.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Strategy without tactics
is the longest route to
victory, tactics without
strategy is the noise
before defeat. – Sun Tzu
Pitfall #2
Not creating an actual
security strategy.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
I learned that focus is key.
Not just in your running
a company, but in your
personal life as well.
– Tim Cook
Pitfall #3
Not clearly defining the
scope and mission of
your SOC and CSIRT.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
The only thing that you
absolutely have to know,
is the location of the
library.–Albert Einstein
Pitfall #4
Not investing in
centralized logging.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Information is a source of
learning. But unless it is
organized, processed, and
available to the right people in
a format for decision making,
it is a burden, not a benefit.
– William Pollard
Pitfall #5
Not continuously
investing in data quality.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
You can use all the
quantitative data you can
get, but you still have to
distrust it and use your own
intelligence and judgment.
– Alvin Toffler
Pitfall #6
Blindly trusting that
vendor detection logic
will discover your threats.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Efficiency is the
foundation for survival.
Effectiveness is the
foundation for success.
– John C. Maxwell
Pitfall #7
Not integrating all your
security solutions in one
centralized cockpit.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Learning is not attained
by chance, it must be
sought for with ardor and
attended to with diligence.
– Abigail Adams
Pitfall #8
Failing to take the
necessary time to seek
out available knowledge.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
No one can whistle a
symphony. It takes a
whole orchestra to play it.
– H.E. Luccock
Pitfall #9
Not systematically learn
from the insigths offered
by your SOC and CSIRT.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Defenders think in lists.
Attackers think in
graphs. As long as this is
true, attackers win.
– John Lambert
Pitfall #10
Not thinking in terms
of dependencies.
Detect & Respond: 10 common pitfalls
pwc.no/Cyber
Thank you
Frode Hommedal
Technical Director
ISF – August 2019
frode.hommedal@pwc.com
Feel free to reach out if you have
any questions or comments.

More Related Content

What's hot

2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three FRSecure
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6FRSecure
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillFrode Hommedal
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class NineFRSecure
 

What's hot (9)

2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
[AVTOKYO 2017] What is red team?
[AVTOKYO 2017] What is red team?[AVTOKYO 2017] What is red team?
[AVTOKYO 2017] What is red team?
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
 

Similar to Detect & Respond: Ten Common Pitfalls

Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majorsPaul Melson
 
PAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message DevelopmentPAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message DevelopmentProActiveCommunications
 
Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Tripwire
 
Startup Diagnostics: Reasons why startups can fail.
Startup Diagnostics: Reasons why startups can fail.Startup Diagnostics: Reasons why startups can fail.
Startup Diagnostics: Reasons why startups can fail.Sonal Raj
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
SAFETY TOOLBOX TALK: Seven Common Accident Causes
SAFETY TOOLBOX TALK: Seven Common Accident CausesSAFETY TOOLBOX TALK: Seven Common Accident Causes
SAFETY TOOLBOX TALK: Seven Common Accident CausesMARLON RAMIREZ
 
Moving beyond Vulnerability Testing
Moving beyond Vulnerability TestingMoving beyond Vulnerability Testing
Moving beyond Vulnerability TestingCapgemini
 
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israel
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israelBe Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israel
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israelJosh (Tzvika) Avnery
 
Convince The Curmudgeon
Convince The CurmudgeonConvince The Curmudgeon
Convince The CurmudgeonCharlene Li
 
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteThe Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteVeracode
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactionsbrucelb
 
The Top Ten Ways to Ensure Successful FDA Meetings
The Top Ten Ways to Ensure Successful FDA MeetingsThe Top Ten Ways to Ensure Successful FDA Meetings
The Top Ten Ways to Ensure Successful FDA MeetingsMichael Swit
 
10 commandments for success at outsourcing
10 commandments for success at outsourcing10 commandments for success at outsourcing
10 commandments for success at outsourcingBhaskarKT
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantJohn Bedrick
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security WorldOWASP
 
Andres guitron pruneda network assessment
Andres guitron pruneda network assessmentAndres guitron pruneda network assessment
Andres guitron pruneda network assessmentAndres Guitron Pruneda
 
Nick Bilogorskiy. How to exit BIG
Nick Bilogorskiy. How to exit BIGNick Bilogorskiy. How to exit BIG
Nick Bilogorskiy. How to exit BIGIT Arena
 

Similar to Detect & Respond: Ten Common Pitfalls (20)

Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
PAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message DevelopmentPAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message Development
 
Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016
 
Startup Diagnostics: Reasons why startups can fail.
Startup Diagnostics: Reasons why startups can fail.Startup Diagnostics: Reasons why startups can fail.
Startup Diagnostics: Reasons why startups can fail.
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
SAFETY TOOLBOX TALK: Seven Common Accident Causes
SAFETY TOOLBOX TALK: Seven Common Accident CausesSAFETY TOOLBOX TALK: Seven Common Accident Causes
SAFETY TOOLBOX TALK: Seven Common Accident Causes
 
Moving beyond Vulnerability Testing
Moving beyond Vulnerability TestingMoving beyond Vulnerability Testing
Moving beyond Vulnerability Testing
 
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israel
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israelBe Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israel
Be Yourself- Startup & Entrepreneurial tips by Tomer Dvir, Mit Forum israel
 
Convince The Curmudgeon
Convince The CurmudgeonConvince The Curmudgeon
Convince The Curmudgeon
 
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteThe Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactions
 
Blackbox safety
Blackbox safetyBlackbox safety
Blackbox safety
 
The Top Ten Ways to Ensure Successful FDA Meetings
The Top Ten Ways to Ensure Successful FDA MeetingsThe Top Ten Ways to Ensure Successful FDA Meetings
The Top Ten Ways to Ensure Successful FDA Meetings
 
10 commandments for success at outsourcing
10 commandments for success at outsourcing10 commandments for success at outsourcing
10 commandments for success at outsourcing
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
 
Andres guitron pruneda network assessment
Andres guitron pruneda network assessmentAndres guitron pruneda network assessment
Andres guitron pruneda network assessment
 
Nick Bilogorskiy. How to exit BIG
Nick Bilogorskiy. How to exit BIGNick Bilogorskiy. How to exit BIG
Nick Bilogorskiy. How to exit BIG
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Detect & Respond: Ten Common Pitfalls

  • 1. Detect & Respond Frode Hommedal Technical Director PwC.no/Cyber ISF – August 2019 10 common pit that will sabotage the effectiveness of your security program
  • 2. Frode Hommedal – PwC.no/Cyber When designing a strategy for detection and response there are numerous pitfalls you can fall into. This presentation will highlight some of them. [Based on my own experience and discussions with peers] DateDetect & Respond: 10 common pitfalls 2
  • 3. Frode Hommedal – PwC.no/Cyber If you fall into too many of these, your security program will likely be ineffective at protecting your organization from internal and external threats.
  • 4. Frode Hommedal – PwC.no/Cyber #whoami Technical analyst turned strategic advisor within the field of detection and response and … security. Detect & Respond: 10 common pitfalls
  • 5. Frode Hommedal – PwC.no/Cyber Risk comes from not knowing what you're doing.– Warren Buffett Pitfall #1 Guessing risk, not basing it on asset valuation and threat and vulnerability assessments. Detect & Respond: 10 common pitfalls
  • 6. Frode Hommedal – PwC.no/Cyber Strategy without tactics is the longest route to victory, tactics without strategy is the noise before defeat. – Sun Tzu Pitfall #2 Not creating an actual security strategy. Detect & Respond: 10 common pitfalls
  • 7. Frode Hommedal – PwC.no/Cyber I learned that focus is key. Not just in your running a company, but in your personal life as well. – Tim Cook Pitfall #3 Not clearly defining the scope and mission of your SOC and CSIRT. Detect & Respond: 10 common pitfalls
  • 8. Frode Hommedal – PwC.no/Cyber The only thing that you absolutely have to know, is the location of the library.–Albert Einstein Pitfall #4 Not investing in centralized logging. Detect & Respond: 10 common pitfalls
  • 9. Frode Hommedal – PwC.no/Cyber Information is a source of learning. But unless it is organized, processed, and available to the right people in a format for decision making, it is a burden, not a benefit. – William Pollard Pitfall #5 Not continuously investing in data quality. Detect & Respond: 10 common pitfalls
  • 10. Frode Hommedal – PwC.no/Cyber You can use all the quantitative data you can get, but you still have to distrust it and use your own intelligence and judgment. – Alvin Toffler Pitfall #6 Blindly trusting that vendor detection logic will discover your threats. Detect & Respond: 10 common pitfalls
  • 11. Frode Hommedal – PwC.no/Cyber Efficiency is the foundation for survival. Effectiveness is the foundation for success. – John C. Maxwell Pitfall #7 Not integrating all your security solutions in one centralized cockpit. Detect & Respond: 10 common pitfalls
  • 12. Frode Hommedal – PwC.no/Cyber Learning is not attained by chance, it must be sought for with ardor and attended to with diligence. – Abigail Adams Pitfall #8 Failing to take the necessary time to seek out available knowledge. Detect & Respond: 10 common pitfalls
  • 13. Frode Hommedal – PwC.no/Cyber No one can whistle a symphony. It takes a whole orchestra to play it. – H.E. Luccock Pitfall #9 Not systematically learn from the insigths offered by your SOC and CSIRT. Detect & Respond: 10 common pitfalls
  • 14. Frode Hommedal – PwC.no/Cyber Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win. – John Lambert Pitfall #10 Not thinking in terms of dependencies. Detect & Respond: 10 common pitfalls
  • 15. pwc.no/Cyber Thank you Frode Hommedal Technical Director ISF – August 2019 frode.hommedal@pwc.com Feel free to reach out if you have any questions or comments.