Expecting Security From the Start(up)
Andrew Case / @attrc
Volexity
NOEW | March 2016
Enterprise Data Needs
 Insider threat & breach investigations
 Discovery & other legal processes
 Migration & backup
Protecting Customers & Yourself
 Monitoring & logging of all backend activities
 Data segregation
 Written policies for data retention
Hire Security Help!
Benefits of a Security/Forensics Adviser
 Find security weaknesses early
 Compliance with industry-specific regulations
 Avoid security snake oil
 Credibility to your security program
Secure Your Corporate Data!
 Encrypt every internal email
 Use secure messaging & voice applications between employees
 Harden employees’ systems (software and hardware)
 Employ compartmentalization of corporate data
 Enforce 2FA *everywhere*
 Encourage learning of security topics
 Encourage security conference participation
 Reward secure coding and design
Encourage Security Learning
 Startups – please stop burning clients during investigations!
 Security architects – don’t put badly designed applications into
production!
 Bring in security/forensics help where appropriate
 Build a culture of security in your company
Conclusions
Comments/Questions?
 Contact:
 acase@volexity.com (3DE6E0C8)
 @attrc
 http://www.dfir.org

Expecting Security from the Startup

  • 1.
    Expecting Security Fromthe Start(up) Andrew Case / @attrc Volexity NOEW | March 2016
  • 2.
    Enterprise Data Needs Insider threat & breach investigations  Discovery & other legal processes  Migration & backup
  • 3.
    Protecting Customers &Yourself  Monitoring & logging of all backend activities  Data segregation  Written policies for data retention
  • 4.
  • 5.
    Benefits of aSecurity/Forensics Adviser  Find security weaknesses early  Compliance with industry-specific regulations  Avoid security snake oil  Credibility to your security program
  • 6.
    Secure Your CorporateData!  Encrypt every internal email  Use secure messaging & voice applications between employees  Harden employees’ systems (software and hardware)  Employ compartmentalization of corporate data  Enforce 2FA *everywhere*
  • 7.
     Encourage learningof security topics  Encourage security conference participation  Reward secure coding and design Encourage Security Learning
  • 8.
     Startups –please stop burning clients during investigations!  Security architects – don’t put badly designed applications into production!  Bring in security/forensics help where appropriate  Build a culture of security in your company Conclusions
  • 9.
    Comments/Questions?  Contact:  acase@volexity.com(3DE6E0C8)  @attrc  http://www.dfir.org