SlideShare a Scribd company logo
@roobixx#POSSCON
Fostering Maturity Through a
Security Lifecycle:
An OSS Case Study
Slide 1 of 412
@roobixx#POSSCON
@roobixx#POSSCON
Info:
● Tim Fowler - OSWP
● Security Consultant, mountainsec, LLC
● Asheville, NC
● Open Source Developer & Practitioner
● @roobixx
@roobixx#POSSCON
Before we get ramped up let's
get a few things straight...
@roobixx#POSSCON
COMPLIENCE != SECURITY
@roobixx#POSSCON
IT != SECURITY
@roobixx#POSSCON
IT != SECURITY
But IT is part of Security
@roobixx#POSSCON
State of Security 2015
@roobixx#POSSCON
Security is hard*
@roobixx#POSSCON
THIS IS PART OF REASONTHIS IS PART OF REASON
SECURITY IS HARD!SECURITY IS HARD!
@roobixx#POSSCON
Many of us are failing epically
Doesn't matter because it isDoesn't matter because it is
already opened...already opened...
@roobixx#POSSCON
@roobixx#POSSCON
@roobixx#POSSCON
RESULTS…
@roobixx#POSSCON
@roobixx#POSSCON
It doesn't have to be this way
@roobixx#POSSCON
Time to ask some questions
● How are “they” doing security?
● What do “they” have that we don't?
● What do “they” know that we really should?
● How can we reduce the gap?
@roobixx#POSSCON
The #1 difference we found
between enterprise security
operations and everyone else
was INSIGHT
@roobixx#POSSCON
Open Source can help you and your
organization gain the INSIGHT you
are lacking
@roobixx#POSSCON
Insight starts with knowing what you have.
Do an inventory of everything. Machines,
software ...and people.
@roobixx#POSSCON
You can't protect that which you
do not you are charged with
protecting.
@roobixx#POSSCON
Security starts at Layer 0. Not the physical
layer but it starts with your people.
People > Things
@roobixx#POSSCON
Insight
● Inventory (Everything)
● Know how it all fits together
● Know your business
● Know your risk
● Know the impact
● Determine your baseline
@roobixx#POSSCON
What is suspicious on your
network?
@roobixx#POSSCON
You can't
determine
what is
suspicious
until you
know what
normal is.
@roobixx#POSSCON
Security is never done. Once you
start, you never will stop. You just
need to get started
@roobixx#POSSCON
Security Lifecycle
@roobixx#POSSCON
@roobixx#POSSCON
@roobixx#POSSCON
It will take time to make it through a
cycle.
@roobixx#POSSCON
We did not make it past Insight.
@roobixx#POSSCON
@roobixx#POSSCON
These Open Source tools and
platforms allows organizations to
go from ZERO to INSIGHT
without breaking the bank or
disrupting business
@roobixx#POSSCON
Utilizing the power of open
source, you can finally answer
the question...”What is normal?”

More Related Content

What's hot

Five Things You Should Experience This Week 06.08.15
Five Things You Should Experience This Week 06.08.15Five Things You Should Experience This Week 06.08.15
Five Things You Should Experience This Week 06.08.15
Joanna Peña-Bickley
 
Defending the Academy from Cyber Threats
Defending the Academy from Cyber ThreatsDefending the Academy from Cyber Threats
Defending the Academy from Cyber Threats
Christian Schreiber, CISM, PMP
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
Bryan Arante
 
Twitter Case Study by PR Newswire
Twitter Case Study by PR NewswireTwitter Case Study by PR Newswire
Twitter Case Study by PR Newswire
Michael Pranikoff
 
Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015
Marcin Grzejszczak
 
Ransomwarever1
Ransomwarever1Ransomwarever1
Ransomwarever1
quickheal_co_ir
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
Vivi Aguilar
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
Tefiit Paredes
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
Jessica Jimenez
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
Stu Hirst
 
Mozilla Tech speakers@MInM2016
Mozilla Tech speakers@MInM2016Mozilla Tech speakers@MInM2016
Mozilla Tech speakers@MInM2016
Sumanth Damarla
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
Bryan Arante
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Scott Cressman
 
Seven deadly essentialisms of the technology industry
Seven deadly essentialisms of the technology industrySeven deadly essentialisms of the technology industry
Seven deadly essentialisms of the technology industry
Viewyonder
 
Taking UX to the Real World
Taking UX to the Real WorldTaking UX to the Real World
Taking UX to the Real World
Kevin Whinnery
 
Defending yourself from the internet
Defending yourself from the internetDefending yourself from the internet
Defending yourself from the internet
Peter Kellner
 
Naswiz livesupport app
Naswiz livesupport appNaswiz livesupport app
Naswiz livesupport app
dhekanenandkishor
 

What's hot (18)

Five Things You Should Experience This Week 06.08.15
Five Things You Should Experience This Week 06.08.15Five Things You Should Experience This Week 06.08.15
Five Things You Should Experience This Week 06.08.15
 
Defending the Academy from Cyber Threats
Defending the Academy from Cyber ThreatsDefending the Academy from Cyber Threats
Defending the Academy from Cyber Threats
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
 
Twitter Case Study by PR Newswire
Twitter Case Study by PR NewswireTwitter Case Study by PR Newswire
Twitter Case Study by PR Newswire
 
Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015
 
Ransomwarever1
Ransomwarever1Ransomwarever1
Ransomwarever1
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
 
Aplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docsAplicaciones web 2_0_google_docs
Aplicaciones web 2_0_google_docs
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 
Mozilla Tech speakers@MInM2016
Mozilla Tech speakers@MInM2016Mozilla Tech speakers@MInM2016
Mozilla Tech speakers@MInM2016
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
Seven deadly essentialisms of the technology industry
Seven deadly essentialisms of the technology industrySeven deadly essentialisms of the technology industry
Seven deadly essentialisms of the technology industry
 
Taking UX to the Real World
Taking UX to the Real WorldTaking UX to the Real World
Taking UX to the Real World
 
Defending yourself from the internet
Defending yourself from the internetDefending yourself from the internet
Defending yourself from the internet
 
Naswiz livesupport app
Naswiz livesupport appNaswiz livesupport app
Naswiz livesupport app
 

Similar to Fostering Maturity Through a Security Lifecycle: An OSS Case Study

Continuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves SecurityContinuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves Security
Sonatype
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
FRSecure
 
Security, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - PrintSecurity, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - Print
Chris Sanchez
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
Sonatype
 
DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!
lokori
 
dotScale 2014
dotScale 2014dotScale 2014
dotScale 2014
Alison Gianotto
 
BHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applicationsBHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applications
Magno Logan
 
Beyond the Retrospective: Embracing Complexity on the Road to Service Ownership
Beyond the Retrospective: Embracing Complexity on the Road to Service OwnershipBeyond the Retrospective: Embracing Complexity on the Road to Service Ownership
Beyond the Retrospective: Embracing Complexity on the Road to Service Ownership
J. Paul Reed
 
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
Gene Kim
 

Similar to Fostering Maturity Through a Security Lifecycle: An OSS Case Study (9)

Continuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves SecurityContinuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves Security
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Security, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - PrintSecurity, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - Print
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
 
DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!
 
dotScale 2014
dotScale 2014dotScale 2014
dotScale 2014
 
BHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applicationsBHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applications
 
Beyond the Retrospective: Embracing Complexity on the Road to Service Ownership
Beyond the Retrospective: Embracing Complexity on the Road to Service OwnershipBeyond the Retrospective: Embracing Complexity on the Road to Service Ownership
Beyond the Retrospective: Embracing Complexity on the Road to Service Ownership
 
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
DOES SFO 2016 - Kevina Finn-Braun & J. Paul Reed - Beyond the Retrospective: ...
 

Recently uploaded

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (11)

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

Fostering Maturity Through a Security Lifecycle: An OSS Case Study