SlideShare a Scribd company logo
I.T. SECURITY Moving at the speed of
business
SURVEY SAYS!
How many of you work in security?
How many of your are security
researchers?
How many of you feel appreciated
for what you do by your peers?
WHAT DO I
DO?
This is what LinkedIn says…
Adept adviser for CIOs, counseling on
industry direction, and advising on future
trends within I.T. Knowledge in strategy
development and process for increased
agility of the enterprise. Extensive enterprise
experience in cloud and on premises
projects, resulting in increased up time,
operational efficiency, and business
enablement.
THE LOGO SLIDE
Tech Security
IN PROGRESS!
WORK
Online Tech
I LIKE TO
START WITH
A QUOTE…
“Those who surrender
freedom for security will
not have, nor do they
deserve, either one.”
- Benjamin Franklin
NOTHING
to do with this guy…
BUSINESS
ARE LIKE
PEOPLE
1. They don’t always
know what they’re
doing, and need to
experiment
2. They need to eat and
drink or they die…
3. Constantly evolving
and changing
WHY IS THIS IMPORTANT
What do people want?
 The First Amendment – Really long, and wouldn’t fit in this space…
 Net Neutrality – Treat all content, applications and services equally, without
discrimination
What do businesses want?
 First Mover Advantage - is the advantage gained by the initial ("first-moving")
significant occupant of a market segment.
 DevOps – Another really long term that wouldn’t fit in this space…
SECURITY
Be a bridge! Enable
the business, but
enable them safely.
What are we
enabling?
• Big Data Analytics
• Health Care
• No Purists!
ORG
CHARTS!
Who Makes the
Money?
Profit
CEO
• CMO
• COO
• CxO
Cost
CFO
• CIO
• CSO
WHAT PAY CHECK WOULD YOU
LIKE?
IT Management
CIO: $157,000 - $262,500
CTO: $137,500 - $220,250
CSO: $134,250 - $204,750
CFO: $292,000 - $625,000
CEO: $350,000 - $750,000
Bus. I.T. Sec.
http://research.chiefexecutive.net/compreport/
http://www.cio.com/article/2878056/salary/tech-salary-guide-for-2015.html
DIGITAL-AGE I.T. MANDATE
Differentiate the business through rapid delivery of
innovative solutions
1. Economies of agility and ingenuity
2. Try and fail fast
3. Emphasis on business outcomes
4. End to end accountable product teams
5. Opex funding / variable cost
6. Continuous improvement
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
HOW CAN SECURITY ENABLE THE
BUSINESS?
4. End to end accountable product teams
https://www.youtube.com/watch?v=hFR4EA6cH1Q
HOW CAN SECURITY ENABLE THE
BUSINESS?
1.Economies of agility and ingenuity
 CD/CI (Puppet / Jenkins)
 The “Cloud”
 New Defense Ideas?
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
HOW CAN SECURITY ENABLE THE
BUSINESS?
2. Try and fail fast - What is your security MVP?
2 Factor Authentication
Not on the domain / separate from user domains
According to Verizon what percent of breaches
would this have prevented?
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
HOW CAN SECURITY ENABLE THE
BUSINESS?
2. Try and fail fast - What is your security MVP?
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
HOW CAN SECURITY ENABLE THE
BUSINESS?
2. Try and fail fast - What is your security MVP?
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
~50%
HOW CAN SECURITY ENABLE THE
BUSINESS?
3. Emphasis on business
outcomes
https://www.sans.org/reading-room/whitepapers/analyst/security-spending-trends-36697
HOW CAN SECURITY ENABLE THE
BUSINESS?
5. Opex funding / variable cost
I.T. spending 1.25% - 3% of revenue (Baker
Mckenzie)
Security as a percent of I.T. 3% - 12%
One hundred million dollar organization security
spend:
$37,500 – $360,000
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
HOW CAN SECURITY ENABLE THE
BUSINESS?
6. Continuous improvement
A well-guided program should grow commensurate
to demonstrated business value potential, start
generating value after six months and become
cost-neutral within 12 months.
http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
WHAT DOES THIS
MEAN FOR YOU?
5. How do you succeed?
 IT Security can’t be the party of “no”
 No room for “security purists”
 In order to elevate the field and your
position you have enable the business
 Seek innovative ways to bring new
lines of business

More Related Content

What's hot

Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
centralohioissa
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
Razorpoint Security
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Mighty Guides, Inc.
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
IJNSA Journal
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Berezha Security Group
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Berezha Security Group
 
16231
1623116231
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Tripwire
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
Positive Hack Days
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
Priyanka Aash
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
Mighty Guides, Inc.
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
EnergySec
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
SlideTeam
 

What's hot (20)

Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
 
16231
1623116231
16231
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 

Similar to IT security

Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
The Lean Startup fbFund Edition
The Lean Startup fbFund EditionThe Lean Startup fbFund Edition
The Lean Startup fbFund Edition
Eric Ries
 
2010 10 19 the lean startup workshop for i_gap ireland
2010 10 19 the lean startup workshop for i_gap ireland2010 10 19 the lean startup workshop for i_gap ireland
2010 10 19 the lean startup workshop for i_gap ireland
Eric Ries
 
2010 02 19 the lean startup - webstock 2010
2010 02 19 the lean startup - webstock 20102010 02 19 the lean startup - webstock 2010
2010 02 19 the lean startup - webstock 2010
Eric Ries
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Eric Ries StartupDay 2011 Speech
Eric Ries StartupDay 2011 SpeechEric Ries StartupDay 2011 Speech
Eric Ries StartupDay 2011 Speech
Startup Weekend
 
eric ries - the lean startup dogpatch LUXr nyc
eric ries - the lean startup dogpatch LUXr nyceric ries - the lean startup dogpatch LUXr nyc
eric ries - the lean startup dogpatch LUXr nyc
Eric Ries
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
accenture
 
2010 10 28 the lean startup at ucsd
2010 10 28 the lean startup at ucsd2010 10 28 the lean startup at ucsd
2010 10 28 the lean startup at ucsd
Eric Ries
 
Eric Ries sllconf keynote: state of the lean startup movement
Eric Ries sllconf keynote: state of the lean startup movementEric Ries sllconf keynote: state of the lean startup movement
Eric Ries sllconf keynote: state of the lean startup movement
Eric Ries
 
Eric Ries - The lean startup
Eric Ries - The lean startupEric Ries - The lean startup
Eric Ries - The lean startup
momentummi
 
Eric Ries - The Lean Startup - Google Tech Talk
Eric Ries - The Lean Startup - Google Tech TalkEric Ries - The Lean Startup - Google Tech Talk
Eric Ries - The Lean Startup - Google Tech Talk
Eric Ries
 
The Lean Startup EA edition
The Lean Startup EA editionThe Lean Startup EA edition
The Lean Startup EA edition
Eric Ries
 
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
Eric Ries
 
2010 08 19 The Lean Startup TechAviv
2010 08 19 The Lean Startup TechAviv2010 08 19 The Lean Startup TechAviv
2010 08 19 The Lean Startup TechAviv
Eric Ries
 
The ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesThe ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologies
Livingstone Advisory
 
Intelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital WorldIntelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital World
Kalilur Rahman
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
Eturnti Consulting Pvt Ltd
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
Peter Bihr
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
Continuity and Resilience
 

Similar to IT security (20)

Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
The Lean Startup fbFund Edition
The Lean Startup fbFund EditionThe Lean Startup fbFund Edition
The Lean Startup fbFund Edition
 
2010 10 19 the lean startup workshop for i_gap ireland
2010 10 19 the lean startup workshop for i_gap ireland2010 10 19 the lean startup workshop for i_gap ireland
2010 10 19 the lean startup workshop for i_gap ireland
 
2010 02 19 the lean startup - webstock 2010
2010 02 19 the lean startup - webstock 20102010 02 19 the lean startup - webstock 2010
2010 02 19 the lean startup - webstock 2010
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Eric Ries StartupDay 2011 Speech
Eric Ries StartupDay 2011 SpeechEric Ries StartupDay 2011 Speech
Eric Ries StartupDay 2011 Speech
 
eric ries - the lean startup dogpatch LUXr nyc
eric ries - the lean startup dogpatch LUXr nyceric ries - the lean startup dogpatch LUXr nyc
eric ries - the lean startup dogpatch LUXr nyc
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
2010 10 28 the lean startup at ucsd
2010 10 28 the lean startup at ucsd2010 10 28 the lean startup at ucsd
2010 10 28 the lean startup at ucsd
 
Eric Ries sllconf keynote: state of the lean startup movement
Eric Ries sllconf keynote: state of the lean startup movementEric Ries sllconf keynote: state of the lean startup movement
Eric Ries sllconf keynote: state of the lean startup movement
 
Eric Ries - The lean startup
Eric Ries - The lean startupEric Ries - The lean startup
Eric Ries - The lean startup
 
Eric Ries - The Lean Startup - Google Tech Talk
Eric Ries - The Lean Startup - Google Tech TalkEric Ries - The Lean Startup - Google Tech Talk
Eric Ries - The Lean Startup - Google Tech Talk
 
The Lean Startup EA edition
The Lean Startup EA editionThe Lean Startup EA edition
The Lean Startup EA edition
 
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
 
2010 08 19 The Lean Startup TechAviv
2010 08 19 The Lean Startup TechAviv2010 08 19 The Lean Startup TechAviv
2010 08 19 The Lean Startup TechAviv
 
The ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesThe ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologies
 
Intelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital WorldIntelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital World
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 

More from Steven Aiello

4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
iSCSI for better or worse
iSCSI for better or worseiSCSI for better or worse
iSCSI for better or worse
Steven Aiello
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
Steven Aiello
 
Off Site Backup Strategies
Off Site Backup Strategies Off Site Backup Strategies
Off Site Backup Strategies
Steven Aiello
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
Steven Aiello
 
Building securable infrastructures
Building securable infrastructures  Building securable infrastructures
Building securable infrastructures
Steven Aiello
 

More from Steven Aiello (6)

4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
iSCSI for better or worse
iSCSI for better or worseiSCSI for better or worse
iSCSI for better or worse
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
 
Off Site Backup Strategies
Off Site Backup Strategies Off Site Backup Strategies
Off Site Backup Strategies
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
 
Building securable infrastructures
Building securable infrastructures  Building securable infrastructures
Building securable infrastructures
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

IT security

  • 1. I.T. SECURITY Moving at the speed of business
  • 2. SURVEY SAYS! How many of you work in security? How many of your are security researchers? How many of you feel appreciated for what you do by your peers?
  • 3. WHAT DO I DO? This is what LinkedIn says… Adept adviser for CIOs, counseling on industry direction, and advising on future trends within I.T. Knowledge in strategy development and process for increased agility of the enterprise. Extensive enterprise experience in cloud and on premises projects, resulting in increased up time, operational efficiency, and business enablement.
  • 4. THE LOGO SLIDE Tech Security IN PROGRESS! WORK Online Tech
  • 5. I LIKE TO START WITH A QUOTE… “Those who surrender freedom for security will not have, nor do they deserve, either one.” - Benjamin Franklin
  • 6. NOTHING to do with this guy…
  • 7. BUSINESS ARE LIKE PEOPLE 1. They don’t always know what they’re doing, and need to experiment 2. They need to eat and drink or they die… 3. Constantly evolving and changing
  • 8. WHY IS THIS IMPORTANT What do people want?  The First Amendment – Really long, and wouldn’t fit in this space…  Net Neutrality – Treat all content, applications and services equally, without discrimination What do businesses want?  First Mover Advantage - is the advantage gained by the initial ("first-moving") significant occupant of a market segment.  DevOps – Another really long term that wouldn’t fit in this space…
  • 9. SECURITY Be a bridge! Enable the business, but enable them safely. What are we enabling? • Big Data Analytics • Health Care • No Purists!
  • 10. ORG CHARTS! Who Makes the Money? Profit CEO • CMO • COO • CxO Cost CFO • CIO • CSO
  • 11. WHAT PAY CHECK WOULD YOU LIKE? IT Management CIO: $157,000 - $262,500 CTO: $137,500 - $220,250 CSO: $134,250 - $204,750 CFO: $292,000 - $625,000 CEO: $350,000 - $750,000 Bus. I.T. Sec. http://research.chiefexecutive.net/compreport/ http://www.cio.com/article/2878056/salary/tech-salary-guide-for-2015.html
  • 12. DIGITAL-AGE I.T. MANDATE Differentiate the business through rapid delivery of innovative solutions 1. Economies of agility and ingenuity 2. Try and fail fast 3. Emphasis on business outcomes 4. End to end accountable product teams 5. Opex funding / variable cost 6. Continuous improvement http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 13. HOW CAN SECURITY ENABLE THE BUSINESS? 4. End to end accountable product teams https://www.youtube.com/watch?v=hFR4EA6cH1Q
  • 14. HOW CAN SECURITY ENABLE THE BUSINESS? 1.Economies of agility and ingenuity  CD/CI (Puppet / Jenkins)  The “Cloud”  New Defense Ideas? http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 15. HOW CAN SECURITY ENABLE THE BUSINESS? 2. Try and fail fast - What is your security MVP? 2 Factor Authentication Not on the domain / separate from user domains According to Verizon what percent of breaches would this have prevented? http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 16. HOW CAN SECURITY ENABLE THE BUSINESS? 2. Try and fail fast - What is your security MVP? http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 17. HOW CAN SECURITY ENABLE THE BUSINESS? 2. Try and fail fast - What is your security MVP? http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html ~50%
  • 18. HOW CAN SECURITY ENABLE THE BUSINESS? 3. Emphasis on business outcomes https://www.sans.org/reading-room/whitepapers/analyst/security-spending-trends-36697
  • 19. HOW CAN SECURITY ENABLE THE BUSINESS? 5. Opex funding / variable cost I.T. spending 1.25% - 3% of revenue (Baker Mckenzie) Security as a percent of I.T. 3% - 12% One hundred million dollar organization security spend: $37,500 – $360,000 http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 20. HOW CAN SECURITY ENABLE THE BUSINESS? 6. Continuous improvement A well-guided program should grow commensurate to demonstrated business value potential, start generating value after six months and become cost-neutral within 12 months. http://www.cio.com/article/3175501/business-alignment/is-the-business-it-gap-intentional.html
  • 21. WHAT DOES THIS MEAN FOR YOU? 5. How do you succeed?  IT Security can’t be the party of “no”  No room for “security purists”  In order to elevate the field and your position you have enable the business  Seek innovative ways to bring new lines of business

Editor's Notes

  1. First Amendment - Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. DevOps - Is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and information technology (IT) professionals while automating the process of software delivery and infrastructure changes. What excited these guys is 100 code pushes a day.