SlideShare a Scribd company logo
Do’s and Don’ts of Risk-based
Security Management in a
Compliance-driven Culture
Security and Regulatory Compliance aren’t the
same thing – but they’re often confused
Shahid N. Shah, CEO
NETSPECTIVE

Who is Shahid?
• 20+ years of architecture, design, software
engineering, and information assurance
(security) in embedded, desktop, and
enterprise environments such as
– FISMA-regulated government systems
– HIPAA-regulated health IT systems
– FDA-regulated medical devices and systems

• Have held positions at CTO, Chief Architect,
or Senior Engineer in a variety of regulated
environments
www.netspective.com

2
Compliance vs. Security
NETSPECTIVE

Compliance vs. Security is like…
Compliance

Security

www.netspective.com

4
NETSPECTIVE

Human Resources
Law: Compliance

www.netspective.com

Order: Security

5
NETSPECTIVE

Knowledge
Compliance knowledge bases

FISMA
HIPAA

FDA
www.netspective.com

Security knowledge areas

PCI DSS

Firewalls

Encryption

ONC

Access
Control

Pen Testing

SOX

Continuous
Monitoring

Packet
Analysis
6
NETSPECTIVE

States
Compliance:
Usually Binary

www.netspective.com

Security:
Continuous Risk Management

7
NETSPECTIVE

Reality
You can be compliant and not secure, secure but not compliant, or both

Compliant

www.netspective.com

Both

Secure

8
NETSPECTIVE

An example of compliant insecurity
It’s easy to check off compliance boxes and still be insecure

Compliance Requirement

• Encrypt all data at FIPS 140
level

Insecure but compliant
• Full disk encryption

– Encryption keys stored on same
disk

•

SSL encryption

– No TLS negotiation or man in the
middle monitoring

Secure and compliant
• Full disk encryption

– Disk-independent key
management

•

www.netspective.com

TLS encryption

– Force SSL  TLS and monitor for
MIM threats

9
NETSPECTIVE

Why does compliant insecurity occur?
Compliance is focused on…

•
•
•
•

Regulations
Meetings & discussions
Documentation
Artifact completion
checklists

www.netspective.com

Instead of…

• Risk management
– Probability of attacks
– Impact of successful attacks

• Threat models
– Attack surfaces
– Attack vectors

10
Recommendations
NETSPECTIVE

Forget compliance
Get your security operations
in proper order before
concentrating on compliance.
Start sounding like a broken
record, ask “is this about
security or compliance?”
often.

www.netspective.com

12
NETSPECTIVE

Consider costs while planning security
100% security is impossible so compliance driven environments must be slowed by cost drivers

Source: Olovsson 1992, “A structured approach to computer security”
www.netspective.com

13
NETSPECTIVE

Don’t rely on perimeter defense
Firewalls and encryption aren’t enough

www.netspective.com

14
NETSPECTIVE

Classify data and assets
NIST 800-60 can help you or you can use your own system (e.g. Microsoft)

Objective

Purpose

Low Impact

Moderate
Impact

High Impact

Confidentiality

Protecting
personal
privacy and
proprietary
Information

Limited adverse
effect from
disclosure

Serious adverse
effect from
disclosure

Catastrophic
effect from
disclosure

Integrity

Guarding against
improper
information
modification
or destruction
and nonrepudiation

Limited adverse
effect from
unauthorized
modification

Serious adverse
effect from
unauthorized
modification

Catastrophic
effect from
unauthorized
modification

Availability

Ensuring timely
and
reliable access to
and use
of information.

Limited adverse
effect from
service
disruption

Serious adverse
effect from
service
disruption

Catastrophic
effect from
service
disruption

www.netspective.com

15
NETSPECTIVE

Clearly express business impacts
Only evidence-driven business-focused impacts should be considered real threats

www.netspective.com

16
NETSPECTIVE

Create risk and threat models
He will win who, prepared himself, waits to take the enemy unprepared – Sun Tzu

Define threats

Create minimal documentation
that you will keep up to date

• Capability, for example:

–
–

Access to the system (how much privilege
escalation must occur prior to
actualization?)
Able to reverse engineer binaries
Able to sniff the network

–
–
–

Experienced hacker
Script kiddie
Insiders

–
–
–
–

Simple manual execution
Distributed bot army
Well-funded organization
Access to private information

–

• Skill Level, for example:

• Resources and Tools, for example:

Motivation + Skills and Capabilities tells
you what you’re up against and begins to
set tone for defenses
Source: OWASP
.org, Microsoft
www.netspective.com

17
NETSPECTIVE

Visualize attacks / vulnerabilities

www.netspective.com

18
NETSPECTIVE

Create an Attack Library
•
•
•
•
•
•
•
•
•
•

Password Brute Force
Buffer Overflow
Canonicalization
Cross-Site Scripting
Cryptanalysis Attack
Denial of Service
Forceful Browsing
Format-String Attacks
HTTP Replay Attacks
Integer Overflows

•
•
•
•

•
•
•
•
•
•

LDAP Injection
Man-in-the-Middle
Network Eavesdropping
One-Click/Session
Riding/CSRF
Repudiation Attack
Response Splitting
Server-Side Code
Injection
Session Hijacking
SQL Injection
XML Injection

Source: Microsoft
www.netspective.com

19
NETSPECTIVE

Collect attack causes and mitigations
Define the relationship
between
• The exploit
• The cause
• The fix

SQL Injection

Use of Dynamic
SQL
Use
parameterized
SQL

Ineffective or
missing input
validation

Validate input

Use stored
procedure with
no dynamic SQL
Source: Microsoft
www.netspective.com

20
NETSPECTIVE

How you know you’re “secure”
• Value of assets to be protected is understood
• Known threats, their occurrence, and how
they will impact the business are cataloged
• Kinds of attacks and vulnerabilities have been
identified along with estimated costs
• Countermeasures associated with attacks and
vulnerabilities, along with the cost of
mitigation, are understood
• Real risk-based decisions drive decisions not
security theater
www.netspective.com

21
NETSPECTIVE

Review security body of knowledge
Everyone
•

•
•

FIPS Publication 199 (Security
Categorization)
FIPS Publication 200 (Minimum
Security Requirements)
NIST Special Publication 800-60
(Security Category Mapping)

Security ops and developers
•
•

•

NIST Special Publication 800-53
(Recommended Security Controls)
Microsoft Patterns & Practices,
Security Engineering
OWASP

Executives and security ops

Auditors

• NIST Special Publication 800-18
(Security Planning)
• NIST Special Publication 800-30
(Risk Management)

•

www.netspective.com

•
•

NIST Special Publication 800-53
(Recommended Security Controls)
NIST Special Publication 800-53A Rev 1
(Security Control Assessment)
NIST Special Publication 800-37
(Certification & Accreditation)

22
NETSPECTIVE

Key Takeaway
• If you have good security operations in place
then meeting compliance requirements is
easier and more straightforward.
• Even if you have a great compliance track
record, it doesn’t mean that you have real
security.

www.netspective.com

23
Visit
http://www.netspective.com
http://www.healthcareguy.com
E-mail shahid.shah@netspective.com
Follow @ShahidNShah
Call 202-713-5409

Thank You

More Related Content

What's hot

Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
centralohioissa
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
ATP Technology Pillars
ATP Technology PillarsATP Technology Pillars
ATP Technology Pillars
Priyanka Aash
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
Chaitanya Bhatt
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
Komand
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
Priyanka Aash
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
CV-SMB-infographic-small
CV-SMB-infographic-smallCV-SMB-infographic-small
CV-SMB-infographic-smallJeff Geissler
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
TicTac Data Recovery
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 

What's hot (20)

Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
ATP Technology Pillars
ATP Technology PillarsATP Technology Pillars
ATP Technology Pillars
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
CV-SMB-infographic-small
CV-SMB-infographic-smallCV-SMB-infographic-small
CV-SMB-infographic-small
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 

Viewers also liked

3D Technologies RD Manchester 2010
3D Technologies RD Manchester 20103D Technologies RD Manchester 2010
3D Technologies RD Manchester 2010
3D Technologies R&D
 
Sn1049 9 Vh caf
Sn1049 9 Vh cafSn1049 9 Vh caf
Medication Compliance Tools and Technology
Medication Compliance Tools and Technology Medication Compliance Tools and Technology
Medication Compliance Tools and Technology
Software Advice
 
Service oriented architecture (SOA) deserves service oriented data
Service oriented architecture (SOA) deserves service oriented dataService oriented architecture (SOA) deserves service oriented data
Service oriented architecture (SOA) deserves service oriented data
Shahid Shah
 
Crusades
CrusadesCrusades
Crusadesrhalter
 
Content Area 2 part ii - Aegean & Ancient Greek Art
Content Area 2 part ii - Aegean & Ancient Greek Art Content Area 2 part ii - Aegean & Ancient Greek Art
Content Area 2 part ii - Aegean & Ancient Greek Art
Jackie Valenzuela
 
Adapting project management to suit personal styles
Adapting project management to suit personal stylesAdapting project management to suit personal styles
Adapting project management to suit personal styles
Donnie MacNicol
 
Spatial Autocorrelation
Spatial AutocorrelationSpatial Autocorrelation
Spatial Autocorrelation
Ehsan Hamzei
 
Zynq MPSoC勉強会 Codec編
Zynq MPSoC勉強会 Codec編Zynq MPSoC勉強会 Codec編
Zynq MPSoC勉強会 Codec編
Tetsuya Morizumi
 
Hls friends 20161122.key
Hls friends 20161122.keyHls friends 20161122.key
Hls friends 20161122.key
Takefumi MIYOSHI
 
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
Kentaro Sano
 
33 Favorite Marketing Books by OnDeck
33 Favorite Marketing Books by OnDeck33 Favorite Marketing Books by OnDeck
33 Favorite Marketing Books by OnDeck
OnDeck
 
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
Carlos Rangel
 
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
Year of the X
 
快樂學華文
快樂學華文快樂學華文
快樂學華文Tzu Wang
 
Navidad 2015 - Susurra el Viento (por: carlitosrangel)
Navidad 2015 - Susurra el Viento (por: carlitosrangel)Navidad 2015 - Susurra el Viento (por: carlitosrangel)
Navidad 2015 - Susurra el Viento (por: carlitosrangel)
Carlos Rangel
 
Chapters 4 6
Chapters 4 6Chapters 4 6
Chapters 4 6rhalter
 
El Reconstructor de los Tiempos (por: carlitosrangel)
El Reconstructor de los Tiempos (por: carlitosrangel)El Reconstructor de los Tiempos (por: carlitosrangel)
El Reconstructor de los Tiempos (por: carlitosrangel)
Carlos Rangel
 
A-Recruiter-Tag 2012 Vorabworkshop
A-Recruiter-Tag 2012 VorabworkshopA-Recruiter-Tag 2012 Vorabworkshop
A-Recruiter-Tag 2012 Vorabworkshop
U-Form:e Testsysteme
 

Viewers also liked (19)

3D Technologies RD Manchester 2010
3D Technologies RD Manchester 20103D Technologies RD Manchester 2010
3D Technologies RD Manchester 2010
 
Sn1049 9 Vh caf
Sn1049 9 Vh cafSn1049 9 Vh caf
Sn1049 9 Vh caf
 
Medication Compliance Tools and Technology
Medication Compliance Tools and Technology Medication Compliance Tools and Technology
Medication Compliance Tools and Technology
 
Service oriented architecture (SOA) deserves service oriented data
Service oriented architecture (SOA) deserves service oriented dataService oriented architecture (SOA) deserves service oriented data
Service oriented architecture (SOA) deserves service oriented data
 
Crusades
CrusadesCrusades
Crusades
 
Content Area 2 part ii - Aegean & Ancient Greek Art
Content Area 2 part ii - Aegean & Ancient Greek Art Content Area 2 part ii - Aegean & Ancient Greek Art
Content Area 2 part ii - Aegean & Ancient Greek Art
 
Adapting project management to suit personal styles
Adapting project management to suit personal stylesAdapting project management to suit personal styles
Adapting project management to suit personal styles
 
Spatial Autocorrelation
Spatial AutocorrelationSpatial Autocorrelation
Spatial Autocorrelation
 
Zynq MPSoC勉強会 Codec編
Zynq MPSoC勉強会 Codec編Zynq MPSoC勉強会 Codec編
Zynq MPSoC勉強会 Codec編
 
Hls friends 20161122.key
Hls friends 20161122.keyHls friends 20161122.key
Hls friends 20161122.key
 
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
FPGAによる津波シミュレーション -- GPUを超える高性能計算の手法
 
33 Favorite Marketing Books by OnDeck
33 Favorite Marketing Books by OnDeck33 Favorite Marketing Books by OnDeck
33 Favorite Marketing Books by OnDeck
 
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
Gibran Khalil Gibran – Poemas y Pensamientos (por: carlitosrangel)
 
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
YOTG Hamburg - Christiane Brandes-Visbeck - Talk to the Goat: Generation Futu...
 
快樂學華文
快樂學華文快樂學華文
快樂學華文
 
Navidad 2015 - Susurra el Viento (por: carlitosrangel)
Navidad 2015 - Susurra el Viento (por: carlitosrangel)Navidad 2015 - Susurra el Viento (por: carlitosrangel)
Navidad 2015 - Susurra el Viento (por: carlitosrangel)
 
Chapters 4 6
Chapters 4 6Chapters 4 6
Chapters 4 6
 
El Reconstructor de los Tiempos (por: carlitosrangel)
El Reconstructor de los Tiempos (por: carlitosrangel)El Reconstructor de los Tiempos (por: carlitosrangel)
El Reconstructor de los Tiempos (por: carlitosrangel)
 
A-Recruiter-Tag 2012 Vorabworkshop
A-Recruiter-Tag 2012 VorabworkshopA-Recruiter-Tag 2012 Vorabworkshop
A-Recruiter-Tag 2012 Vorabworkshop
 

Similar to Do’s and Don’ts of Risk-based Security management in a Compliance-driven Culture

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
Michael Torres
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
Amazon Web Services
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
Alert Logic
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Emrah Alpa, CISSP CEH CCSK
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
North Texas Chapter of the ISSA
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
David Etue
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
Eoin Keary
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
SafeNet
 

Similar to Do’s and Don’ts of Risk-based Security management in a Compliance-driven Culture (20)

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 

More from Shahid Shah

Demand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRsDemand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRs
Shahid Shah
 
The biggest opportunities in digital health for Turkey's Medical Sector
The biggest opportunities in digital health  for Turkey's Medical Sector The biggest opportunities in digital health  for Turkey's Medical Sector
The biggest opportunities in digital health for Turkey's Medical Sector
Shahid Shah
 
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About It
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About ItReasons Why Health Data is Poorly Integrated Today and What We Can Do About It
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About It
Shahid Shah
 
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
Shahid Shah
 
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
Shahid Shah
 
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
Shahid Shah
 
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
Shahid Shah
 
Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...
Shahid Shah
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devices
Shahid Shah
 
Healthcare New Media Marketing Conference Keynote
Healthcare New Media Marketing Conference KeynoteHealthcare New Media Marketing Conference Keynote
Healthcare New Media Marketing Conference Keynote
Shahid Shah
 
How to Commercialize Your Healthcare/IT/Media Product
How to Commercialize Your Healthcare/IT/Media ProductHow to Commercialize Your Healthcare/IT/Media Product
How to Commercialize Your Healthcare/IT/Media ProductShahid Shah
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
Shahid Shah
 
Guaranteeing successful EHR implementations
Guaranteeing successful EHR implementationsGuaranteeing successful EHR implementations
Guaranteeing successful EHR implementations
Shahid Shah
 
The EMR/EHR and Health IT Landscape for Sales Professionals
The EMR/EHR and Health IT Landscape for Sales ProfessionalsThe EMR/EHR and Health IT Landscape for Sales Professionals
The EMR/EHR and Health IT Landscape for Sales Professionals
Shahid Shah
 
How Wireless Networks Empower Patients
How Wireless Networks Empower PatientsHow Wireless Networks Empower Patients
How Wireless Networks Empower Patients
Shahid Shah
 
Building safety-critical medical device platforms and Meaningful Use EHR gate...
Building safety-critical medical device platforms and Meaningful Use EHR gate...Building safety-critical medical device platforms and Meaningful Use EHR gate...
Building safety-critical medical device platforms and Meaningful Use EHR gate...
Shahid Shah
 
Reasons why health data is poorly integrated today and what we can do about it
Reasons why health data is poorly integrated today and what we can do about itReasons why health data is poorly integrated today and what we can do about it
Reasons why health data is poorly integrated today and what we can do about it
Shahid Shah
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
Shahid Shah
 
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Shahid Shah
 
OSEHRA and VistA Platform Overview
OSEHRA and VistA Platform OverviewOSEHRA and VistA Platform Overview
OSEHRA and VistA Platform Overview
Shahid Shah
 

More from Shahid Shah (20)

Demand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRsDemand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRs
 
The biggest opportunities in digital health for Turkey's Medical Sector
The biggest opportunities in digital health  for Turkey's Medical Sector The biggest opportunities in digital health  for Turkey's Medical Sector
The biggest opportunities in digital health for Turkey's Medical Sector
 
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About It
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About ItReasons Why Health Data is Poorly Integrated Today and What We Can Do About It
Reasons Why Health Data is Poorly Integrated Today and What We Can Do About It
 
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
 
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
Open Source is a great opportunity for EHR, Digital Health, and Health IT Int...
 
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
 
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
The shift from Fee for Service to Outcomes-Driven care means huge opportuniti...
 
Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devices
 
Healthcare New Media Marketing Conference Keynote
Healthcare New Media Marketing Conference KeynoteHealthcare New Media Marketing Conference Keynote
Healthcare New Media Marketing Conference Keynote
 
How to Commercialize Your Healthcare/IT/Media Product
How to Commercialize Your Healthcare/IT/Media ProductHow to Commercialize Your Healthcare/IT/Media Product
How to Commercialize Your Healthcare/IT/Media Product
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
 
Guaranteeing successful EHR implementations
Guaranteeing successful EHR implementationsGuaranteeing successful EHR implementations
Guaranteeing successful EHR implementations
 
The EMR/EHR and Health IT Landscape for Sales Professionals
The EMR/EHR and Health IT Landscape for Sales ProfessionalsThe EMR/EHR and Health IT Landscape for Sales Professionals
The EMR/EHR and Health IT Landscape for Sales Professionals
 
How Wireless Networks Empower Patients
How Wireless Networks Empower PatientsHow Wireless Networks Empower Patients
How Wireless Networks Empower Patients
 
Building safety-critical medical device platforms and Meaningful Use EHR gate...
Building safety-critical medical device platforms and Meaningful Use EHR gate...Building safety-critical medical device platforms and Meaningful Use EHR gate...
Building safety-critical medical device platforms and Meaningful Use EHR gate...
 
Reasons why health data is poorly integrated today and what we can do about it
Reasons why health data is poorly integrated today and what we can do about itReasons why health data is poorly integrated today and what we can do about it
Reasons why health data is poorly integrated today and what we can do about it
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
 
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
 
OSEHRA and VistA Platform Overview
OSEHRA and VistA Platform OverviewOSEHRA and VistA Platform Overview
OSEHRA and VistA Platform Overview
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Do’s and Don’ts of Risk-based Security management in a Compliance-driven Culture

  • 1. Do’s and Don’ts of Risk-based Security Management in a Compliance-driven Culture Security and Regulatory Compliance aren’t the same thing – but they’re often confused Shahid N. Shah, CEO
  • 2. NETSPECTIVE Who is Shahid? • 20+ years of architecture, design, software engineering, and information assurance (security) in embedded, desktop, and enterprise environments such as – FISMA-regulated government systems – HIPAA-regulated health IT systems – FDA-regulated medical devices and systems • Have held positions at CTO, Chief Architect, or Senior Engineer in a variety of regulated environments www.netspective.com 2
  • 4. NETSPECTIVE Compliance vs. Security is like… Compliance Security www.netspective.com 4
  • 6. NETSPECTIVE Knowledge Compliance knowledge bases FISMA HIPAA FDA www.netspective.com Security knowledge areas PCI DSS Firewalls Encryption ONC Access Control Pen Testing SOX Continuous Monitoring Packet Analysis 6
  • 8. NETSPECTIVE Reality You can be compliant and not secure, secure but not compliant, or both Compliant www.netspective.com Both Secure 8
  • 9. NETSPECTIVE An example of compliant insecurity It’s easy to check off compliance boxes and still be insecure Compliance Requirement • Encrypt all data at FIPS 140 level Insecure but compliant • Full disk encryption – Encryption keys stored on same disk • SSL encryption – No TLS negotiation or man in the middle monitoring Secure and compliant • Full disk encryption – Disk-independent key management • www.netspective.com TLS encryption – Force SSL  TLS and monitor for MIM threats 9
  • 10. NETSPECTIVE Why does compliant insecurity occur? Compliance is focused on… • • • • Regulations Meetings & discussions Documentation Artifact completion checklists www.netspective.com Instead of… • Risk management – Probability of attacks – Impact of successful attacks • Threat models – Attack surfaces – Attack vectors 10
  • 12. NETSPECTIVE Forget compliance Get your security operations in proper order before concentrating on compliance. Start sounding like a broken record, ask “is this about security or compliance?” often. www.netspective.com 12
  • 13. NETSPECTIVE Consider costs while planning security 100% security is impossible so compliance driven environments must be slowed by cost drivers Source: Olovsson 1992, “A structured approach to computer security” www.netspective.com 13
  • 14. NETSPECTIVE Don’t rely on perimeter defense Firewalls and encryption aren’t enough www.netspective.com 14
  • 15. NETSPECTIVE Classify data and assets NIST 800-60 can help you or you can use your own system (e.g. Microsoft) Objective Purpose Low Impact Moderate Impact High Impact Confidentiality Protecting personal privacy and proprietary Information Limited adverse effect from disclosure Serious adverse effect from disclosure Catastrophic effect from disclosure Integrity Guarding against improper information modification or destruction and nonrepudiation Limited adverse effect from unauthorized modification Serious adverse effect from unauthorized modification Catastrophic effect from unauthorized modification Availability Ensuring timely and reliable access to and use of information. Limited adverse effect from service disruption Serious adverse effect from service disruption Catastrophic effect from service disruption www.netspective.com 15
  • 16. NETSPECTIVE Clearly express business impacts Only evidence-driven business-focused impacts should be considered real threats www.netspective.com 16
  • 17. NETSPECTIVE Create risk and threat models He will win who, prepared himself, waits to take the enemy unprepared – Sun Tzu Define threats Create minimal documentation that you will keep up to date • Capability, for example: – – Access to the system (how much privilege escalation must occur prior to actualization?) Able to reverse engineer binaries Able to sniff the network – – – Experienced hacker Script kiddie Insiders – – – – Simple manual execution Distributed bot army Well-funded organization Access to private information – • Skill Level, for example: • Resources and Tools, for example: Motivation + Skills and Capabilities tells you what you’re up against and begins to set tone for defenses Source: OWASP .org, Microsoft www.netspective.com 17
  • 18. NETSPECTIVE Visualize attacks / vulnerabilities www.netspective.com 18
  • 19. NETSPECTIVE Create an Attack Library • • • • • • • • • • Password Brute Force Buffer Overflow Canonicalization Cross-Site Scripting Cryptanalysis Attack Denial of Service Forceful Browsing Format-String Attacks HTTP Replay Attacks Integer Overflows • • • • • • • • • • LDAP Injection Man-in-the-Middle Network Eavesdropping One-Click/Session Riding/CSRF Repudiation Attack Response Splitting Server-Side Code Injection Session Hijacking SQL Injection XML Injection Source: Microsoft www.netspective.com 19
  • 20. NETSPECTIVE Collect attack causes and mitigations Define the relationship between • The exploit • The cause • The fix SQL Injection Use of Dynamic SQL Use parameterized SQL Ineffective or missing input validation Validate input Use stored procedure with no dynamic SQL Source: Microsoft www.netspective.com 20
  • 21. NETSPECTIVE How you know you’re “secure” • Value of assets to be protected is understood • Known threats, their occurrence, and how they will impact the business are cataloged • Kinds of attacks and vulnerabilities have been identified along with estimated costs • Countermeasures associated with attacks and vulnerabilities, along with the cost of mitigation, are understood • Real risk-based decisions drive decisions not security theater www.netspective.com 21
  • 22. NETSPECTIVE Review security body of knowledge Everyone • • • FIPS Publication 199 (Security Categorization) FIPS Publication 200 (Minimum Security Requirements) NIST Special Publication 800-60 (Security Category Mapping) Security ops and developers • • • NIST Special Publication 800-53 (Recommended Security Controls) Microsoft Patterns & Practices, Security Engineering OWASP Executives and security ops Auditors • NIST Special Publication 800-18 (Security Planning) • NIST Special Publication 800-30 (Risk Management) • www.netspective.com • • NIST Special Publication 800-53 (Recommended Security Controls) NIST Special Publication 800-53A Rev 1 (Security Control Assessment) NIST Special Publication 800-37 (Certification & Accreditation) 22
  • 23. NETSPECTIVE Key Takeaway • If you have good security operations in place then meeting compliance requirements is easier and more straightforward. • Even if you have a great compliance track record, it doesn’t mean that you have real security. www.netspective.com 23