Copyright © Oy Samlink Ab
Information
security
♥
service design Service Design Drinks
10.2.2015
Jari Pirhonen
@japi999
www.slideshare.net/japijapi
Copyright © Oy Samlink Ab
Why do cars have brakes?
10.2.2015@japi999
Copyright © Oy Samlink Ab
Because speed is
nothing without control!
10.2.2015@japi999
Copyright © Oy Samlink Ab
Why information security?
You want
 enable business, trust, 24/7
10.2.2015@japi999
You must
 compliance, regulation
You fear
 risk management
Copyright © Oy Samlink Ab 10.2.2015@japi999
Copyright © Oy Samlink Ab 10.2.2015@japi999
Copyright © Oy Samlink Ab
Security – tower of Babel?
10.2.2015@japi999
Horizontal innovation
Verticalinnovation
Copyright © Oy Samlink Ab
Security = Quality
Security service <> Secure service
Security design <> Secure design
10.2.2015
Information security is too important to be
left just to information security experts!
@japi999
Copyright © Oy Samlink Ab
Quality by design
Security by design
Privacy by design
Secure defaults
10.2.2015@japi999
Copyright © Oy Samlink Ab
Rule #1
Users are NOT the weakest links
10.2.2015@japi999
Copyright © Oy Samlink Ab
Set the bar for security
 Service environment
 Crown jewels, users, adversaries
 Business needs & risk appetite
 Security requirements
 Want, must, fear
 Understood, accepted,
communicated
 Human (irrational) behaviour
10.2.2015@japi999
Copyright © Oy Samlink Ab
Security must be baked in
not sprinkled on top
 KISS
 Check the input  garbage in, garbage out
 Secure, Fast, Cheap: Pick any two
 Defense in depth (or the onion principle)
 Fail safely
 Separation of duties
 Four-eyes principle for security critical tasks
 Do not trust blindly
 Open design - no security by obscurity
 User-friendly, intuitive, invisible security
10.2.2015@japi999
Copyright © Oy Samlink Ab
Better than secure?
10.2.2015
Secure
@japi999
Resilient Antifragile
Copyright © Oy Samlink Ab
What used to fit in a building,
now fits in your pocket,
and what fits in your pocket now,
will fit inside a blood cell in 25 years.
-- Ray Kurzweil
10.2.2015@japi999

Samlink-sd-drinks-10.2.15

  • 1.
    Copyright © OySamlink Ab Information security ♥ service design Service Design Drinks 10.2.2015 Jari Pirhonen @japi999 www.slideshare.net/japijapi
  • 2.
    Copyright © OySamlink Ab Why do cars have brakes? 10.2.2015@japi999
  • 3.
    Copyright © OySamlink Ab Because speed is nothing without control! 10.2.2015@japi999
  • 4.
    Copyright © OySamlink Ab Why information security? You want  enable business, trust, 24/7 10.2.2015@japi999 You must  compliance, regulation You fear  risk management
  • 5.
    Copyright © OySamlink Ab 10.2.2015@japi999
  • 6.
    Copyright © OySamlink Ab 10.2.2015@japi999
  • 7.
    Copyright © OySamlink Ab Security – tower of Babel? 10.2.2015@japi999 Horizontal innovation Verticalinnovation
  • 8.
    Copyright © OySamlink Ab Security = Quality Security service <> Secure service Security design <> Secure design 10.2.2015 Information security is too important to be left just to information security experts! @japi999
  • 9.
    Copyright © OySamlink Ab Quality by design Security by design Privacy by design Secure defaults 10.2.2015@japi999
  • 10.
    Copyright © OySamlink Ab Rule #1 Users are NOT the weakest links 10.2.2015@japi999
  • 11.
    Copyright © OySamlink Ab Set the bar for security  Service environment  Crown jewels, users, adversaries  Business needs & risk appetite  Security requirements  Want, must, fear  Understood, accepted, communicated  Human (irrational) behaviour 10.2.2015@japi999
  • 12.
    Copyright © OySamlink Ab Security must be baked in not sprinkled on top  KISS  Check the input  garbage in, garbage out  Secure, Fast, Cheap: Pick any two  Defense in depth (or the onion principle)  Fail safely  Separation of duties  Four-eyes principle for security critical tasks  Do not trust blindly  Open design - no security by obscurity  User-friendly, intuitive, invisible security 10.2.2015@japi999
  • 13.
    Copyright © OySamlink Ab Better than secure? 10.2.2015 Secure @japi999 Resilient Antifragile
  • 14.
    Copyright © OySamlink Ab What used to fit in a building, now fits in your pocket, and what fits in your pocket now, will fit inside a blood cell in 25 years. -- Ray Kurzweil 10.2.2015@japi999

Editor's Notes

  • #5 Data Security  IT Security  Information Security  Cyber Security  Digital Security
  • #7 Are criminals and the NSA only information security innovators?
  • #8 Technology and digitalization  vertical innovations Information security  horizontal innovations
  • #9 People don’t want encryption, PKI and certificates – they want safe and secure communications
  • #11 User are the weakest link IF users are forgotten at design phase
  • #13 Keeping secrets is hard Understand your assumpions From "Murphy's computer" to "Satan's computer"
  • #15 Will we still be using tiiny tiny ”nanofirewalls and nano anti-virus”?