SlideShare a Scribd company logo
Security agility - dynamic policy creation and
rollout
Have you ever thought of dynamic policy creation?
Not in a technical sense rather from an organisational
point of view.
The following example of a recent story is the perfect analogy for dynamic policy
creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were
presented with a heat wave. All over the news people where warned about the topic of
leaving your children or your pets in the car. Unfortunately there where fatalities due to
the practice of leaving small children in the car. There was a lot of talk but MediaMarkt
spun into action. This story has all the ingredients for future security (advanced
persistent threats) APT's and how you will have to deal with them. The same process'
will have to be applied to your policy framework.
Here the story and the ingredients that made it so worthy of mentioning.
The A frame with the new store policy.
The signs says: Dogs Welcome! Dear customers Dogs are welcome because of the
current temperatures which could be unbearable or even deadly for your animal even
if you have opened the windows of your car. Therefore Dogs are allowed due to this
temperatures.
The following table highlights the temperature development in a car by any give outside
temperature in dependence of time. This is not a scientific study and the values might
differ in your specific context or country. It is an illustration.
Outside
temperature
ºC and ºF
5 minutes 10 minutes 30 minutes 60 minutes
20ºC (68ºF) 24 ºC (75.2ºF) 27 ºC (80.6ºF) 36 ºC (96.8ºF) 46 ºC (114.8ºF)
22 ºC (71.6ºF) 26 ºC (78.8ºF) 29 ºC (84.2ºF) 38 ºC (100.4ºF) 48 ºC (118.4ºF)
24 ºC (75.2ºF) 28 ºC (82.4ºF) 31 ºC (87.8ºF) 40 ºC (104ºF) 50 ºC (122ºF)
26 ºC (78.8ºF) 30 ºC (86ºF) 33 ºC (91.4ºF) 42 ºC (107.6ºF) 52 ºC (125.6ºF)
28 ºC (82.4ºF) 32 ºC (89.4ºF) 35 ºC (95ºF) 44 ºC (111.2ºF) 54 ºC (129.6ºF)
30 ºC (86ºF) 34 ºC (93.2ºF) 37 ºC (98.6ºF) 46 ºC (114.8ºF) 56 ºC (132.2ºF)
32 ºC (89.6ºF) 36 ºC (96.8ºF) 39 ºC (102.2ºF) 48 ºC (118.4ºF) 58 ºC (136.4ºF)
34 ºC (93.2ºF) 38 ºC (100.4ºF) 41 ºC (105.8ºF) 50 ºC (122ºF) 60 ºC (140ºF)
36 ºC (96.8ºF) 40 ºC (104ºF) 43 ºC (109.4ºF) 52 ºC (125.6ºF) 62 ºC (143.6ºF)
38 ºC (100.4ºF) 42 ºC (107.6ºF) 45 ºC (113ºF) 54 ºC (129.2ºF) 64 ºC (147.2ºF)
40 ºC (104ºF) 44 ºC (111.2ºF) 47 ºC (116.6ºF) 56 ºC (132.2ºF) 68 ºC (154.4ºF)
Conversion ºF to ºC.
ºC * 1.8000 +32
This is the story!
So what? Nice story but what is the point aside from animal loving or caring for smallest
and most vulnerable in our community.
The exact same thought process applies to information security management. You are
maybe used to policy development based on an ISMS. There we say the public
information security policy should have an expected life span of 2-3 years. The more
detailed the policies go --> Server and Computer polices the more frequent they have
to chance and adapt to new technology for instance.
Now with the landscape of today's with APT's and risks emerging within hours or even
minutes all this has to happen much faster (like the dog policy). This is why I use the
dog policy analogy. Phishing for instance requires reaction times within minutes. A
phishing attack within an organisation requires you to act very swiftly. Experience
shows after the phishing email has entered your organisation some dude somewhere
will fall for it and either clicks on the payload (attached file) or the link in the email within
roughly 16 minutes. Yea right, and don't' forget this 24x7.
The Ingredients you need for dynamic policy creation (if a Dog store policy or a
phishing/ social engineering policy):
- Leadership (seeing the greater context of your environment and conclude what is in
the best interest for you as a company, for the ones around you (your customers) and
the ones your customers care about (their dogs or kids) for instance!
- Competence (acting within your competence or level of influence)
- Resources (what is at your hand)
- Flexible management (ability to convince others that you are on the right track, trust
in your skills and judgement)
- Drive to excel and deliver the best customer experience you can
What you do with these ingredients:
- Assess the situation (detect the problem)
- Understand the problem in a wider perspective (you clients problems)
- look for probable solutions (select the most promising one)
- Plan the necessary changes (Printing the posters for the A frames for
instance, distribute the posters to the locations, release a memo to the store
locations)
- Rollout/ implement the changes
- Monitor development (does the situation change, is there adjustment necessary)
- Correct if necessary
- Revert to normal operation
Your use case is of course not the dog of your client it’s his data. What have you done
today to make the data of your client more secure? Have you talked about APT's like
social engineering, phishing or any other security breaches? This is your dog.
Cheers Dom

More Related Content

Similar to Security agility- dynamic policy creation and rollout

Datawiz.io case study
Datawiz.io case studyDatawiz.io case study
Datawiz.io case study
Володимир Непьюк
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
Caston Thomas
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environment
Arthur Donkers
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
PECB
 
Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)
MeasureWorks
 
Devops for business : Efficiency & Innovation
Devops for business : Efficiency & InnovationDevops for business : Efficiency & Innovation
Devops for business : Efficiency & Innovation
Satish Bhatia
 
Ml in a day v 1.1
Ml in a day v 1.1Ml in a day v 1.1
Ml in a day v 1.1
CCG
 
Be a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product LeaderBe a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product Leader
Product School
 
Domains and data analytics
Domains and data analyticsDomains and data analytics
Domains and data analytics
Pratik Shukla
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
Net at Work
 
T eco mate-presentation
T eco mate-presentationT eco mate-presentation
T eco mate-presentation
Vishal Dave
 
Guerilla Change - Company Caboose
Guerilla Change - Company CabooseGuerilla Change - Company Caboose
Guerilla Change - Company Caboose
Tom Rijks
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
Luiz C. Parzianello
 
Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...
Jon Hawes
 
Einstein Analytics Prediction Builder
Einstein Analytics Prediction BuilderEinstein Analytics Prediction Builder
Einstein Analytics Prediction Builder
rikkehovgaard
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Om0018 technology management
Om0018 technology managementOm0018 technology management
Om0018 technology management
consult4solutions
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
Jerry Horne
 
Fantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl WeirFantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl Weir
Futurice
 
Footfallcam Analysis
Footfallcam AnalysisFootfallcam Analysis
Footfallcam Analysis
FootfallCam
 

Similar to Security agility- dynamic policy creation and rollout (20)

Datawiz.io case study
Datawiz.io case studyDatawiz.io case study
Datawiz.io case study
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Cyber Security testing in an agile environment
Cyber Security testing in an agile environmentCyber Security testing in an agile environment
Cyber Security testing in an agile environment
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)Talent Institute - Frictionless Conversion (workshop)
Talent Institute - Frictionless Conversion (workshop)
 
Devops for business : Efficiency & Innovation
Devops for business : Efficiency & InnovationDevops for business : Efficiency & Innovation
Devops for business : Efficiency & Innovation
 
Ml in a day v 1.1
Ml in a day v 1.1Ml in a day v 1.1
Ml in a day v 1.1
 
Be a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product LeaderBe a Top Notch PM Using Data Science by Farfetch Product Leader
Be a Top Notch PM Using Data Science by Farfetch Product Leader
 
Domains and data analytics
Domains and data analyticsDomains and data analytics
Domains and data analytics
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
T eco mate-presentation
T eco mate-presentationT eco mate-presentation
T eco mate-presentation
 
Guerilla Change - Company Caboose
Guerilla Change - Company CabooseGuerilla Change - Company Caboose
Guerilla Change - Company Caboose
 
From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
 
Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...Building an enterprise security knowledge graph to fuel better decisions, fas...
Building an enterprise security knowledge graph to fuel better decisions, fas...
 
Einstein Analytics Prediction Builder
Einstein Analytics Prediction BuilderEinstein Analytics Prediction Builder
Einstein Analytics Prediction Builder
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Om0018 technology management
Om0018 technology managementOm0018 technology management
Om0018 technology management
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
 
Fantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl WeirFantastic Problems and Where to Find Them: Daryl Weir
Fantastic Problems and Where to Find Them: Daryl Weir
 
Footfallcam Analysis
Footfallcam AnalysisFootfallcam Analysis
Footfallcam Analysis
 

More from Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
Reputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
Reputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
Reputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
Reputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
Reputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
Reputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
Reputelligence
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
Reputelligence
 

More from Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 

Recently uploaded

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 

Recently uploaded (20)

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 

Security agility- dynamic policy creation and rollout

  • 1. Security agility - dynamic policy creation and rollout Have you ever thought of dynamic policy creation? Not in a technical sense rather from an organisational point of view. The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT's and how you will have to deal with them. The same process' will have to be applied to your policy framework. Here the story and the ingredients that made it so worthy of mentioning. The A frame with the new store policy.
  • 2. The signs says: Dogs Welcome! Dear customers Dogs are welcome because of the current temperatures which could be unbearable or even deadly for your animal even if you have opened the windows of your car. Therefore Dogs are allowed due to this temperatures. The following table highlights the temperature development in a car by any give outside temperature in dependence of time. This is not a scientific study and the values might differ in your specific context or country. It is an illustration. Outside temperature ºC and ºF 5 minutes 10 minutes 30 minutes 60 minutes 20ºC (68ºF) 24 ºC (75.2ºF) 27 ºC (80.6ºF) 36 ºC (96.8ºF) 46 ºC (114.8ºF) 22 ºC (71.6ºF) 26 ºC (78.8ºF) 29 ºC (84.2ºF) 38 ºC (100.4ºF) 48 ºC (118.4ºF) 24 ºC (75.2ºF) 28 ºC (82.4ºF) 31 ºC (87.8ºF) 40 ºC (104ºF) 50 ºC (122ºF) 26 ºC (78.8ºF) 30 ºC (86ºF) 33 ºC (91.4ºF) 42 ºC (107.6ºF) 52 ºC (125.6ºF) 28 ºC (82.4ºF) 32 ºC (89.4ºF) 35 ºC (95ºF) 44 ºC (111.2ºF) 54 ºC (129.6ºF) 30 ºC (86ºF) 34 ºC (93.2ºF) 37 ºC (98.6ºF) 46 ºC (114.8ºF) 56 ºC (132.2ºF) 32 ºC (89.6ºF) 36 ºC (96.8ºF) 39 ºC (102.2ºF) 48 ºC (118.4ºF) 58 ºC (136.4ºF) 34 ºC (93.2ºF) 38 ºC (100.4ºF) 41 ºC (105.8ºF) 50 ºC (122ºF) 60 ºC (140ºF) 36 ºC (96.8ºF) 40 ºC (104ºF) 43 ºC (109.4ºF) 52 ºC (125.6ºF) 62 ºC (143.6ºF) 38 ºC (100.4ºF) 42 ºC (107.6ºF) 45 ºC (113ºF) 54 ºC (129.2ºF) 64 ºC (147.2ºF) 40 ºC (104ºF) 44 ºC (111.2ºF) 47 ºC (116.6ºF) 56 ºC (132.2ºF) 68 ºC (154.4ºF) Conversion ºF to ºC. ºC * 1.8000 +32 This is the story! So what? Nice story but what is the point aside from animal loving or caring for smallest and most vulnerable in our community.
  • 3. The exact same thought process applies to information security management. You are maybe used to policy development based on an ISMS. There we say the public information security policy should have an expected life span of 2-3 years. The more detailed the policies go --> Server and Computer polices the more frequent they have to chance and adapt to new technology for instance. Now with the landscape of today's with APT's and risks emerging within hours or even minutes all this has to happen much faster (like the dog policy). This is why I use the dog policy analogy. Phishing for instance requires reaction times within minutes. A phishing attack within an organisation requires you to act very swiftly. Experience shows after the phishing email has entered your organisation some dude somewhere will fall for it and either clicks on the payload (attached file) or the link in the email within roughly 16 minutes. Yea right, and don't' forget this 24x7. The Ingredients you need for dynamic policy creation (if a Dog store policy or a phishing/ social engineering policy): - Leadership (seeing the greater context of your environment and conclude what is in the best interest for you as a company, for the ones around you (your customers) and the ones your customers care about (their dogs or kids) for instance! - Competence (acting within your competence or level of influence) - Resources (what is at your hand) - Flexible management (ability to convince others that you are on the right track, trust in your skills and judgement) - Drive to excel and deliver the best customer experience you can What you do with these ingredients: - Assess the situation (detect the problem) - Understand the problem in a wider perspective (you clients problems) - look for probable solutions (select the most promising one)
  • 4. - Plan the necessary changes (Printing the posters for the A frames for instance, distribute the posters to the locations, release a memo to the store locations) - Rollout/ implement the changes - Monitor development (does the situation change, is there adjustment necessary) - Correct if necessary - Revert to normal operation Your use case is of course not the dog of your client it’s his data. What have you done today to make the data of your client more secure? Have you talked about APT's like social engineering, phishing or any other security breaches? This is your dog. Cheers Dom