SlideShare a Scribd company logo
Smarter Security

Omar Khawaja

@smallersecurity
1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING
THEORETICAL: Universe of bad things that can happen to anyone

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

2
2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS
ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS
ACTUAL: Bad things (color indicates frequency) that actually happened

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

3
3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR
ORGANIZATION BE WORRIED ABOUT?
THEORETICAL FOR YOU: bad things that are likely to happen to your organization
if you have no protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

4
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

5
5. What is the desired state?
IDEAL FOR YOU: bad things that are likely to happen to your organization given you
have sufficient protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

6
What’s under the hood?
VERIS
VERIS is a (open and free) set of metrics designed to provide a common
language for describing security incidents (or threats) in a structured and
repeatable manner.

Actor – Who did it?

Action – How’d they do it?
Asset – What was affected?
Attribute – How was it affected?
http://www.veriscommunity.net
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

8
1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING
THEORETICAL: Universe of bad things that can happen to anyone

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

9
2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY
HAPPENED ACROSS ALL ORGANIZATIONS
ACTUAL: Bad things (color indicates frequency) that actually happened

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

10
3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR
ORGANIZATION BE WORRIED ABOUT?
THEORETICAL FOR YOU: bad things that are likely to happen to your organization if
you have no protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

11
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

12
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

13
5. HOW DO YOU GET TO THE DESIRED STATE?

6 SECURITY SOLUTION AREAS:
• Data Protection
• Governance, Risk & Compliance
• Identity & Access Mgmt
• Investigative Response
• Threat Mgmt (MSS)
• Vulnerability Mgmt

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

14
5. HOW DO YOU GET TO THE DESIRED STATE?
SOME SPECIFICS…
DBIR FINDINGS

VERIZON SOLUTIONS

WHY VERIZON?

71%: victim didn’t know how
much data was stolen

Data Discovery (DDISC)

Scanned 100,000,000+ files and
discovered 1,000,000,000+ targeted
data elements

61%: payment card data was stolen

PCI Compliance

More PCI auditors(140+ QSAs) than
any other firm in the world

100%: data was exfilterated

Data Loss Prevention (DLP)

Led one of the largest DLP
deployments
in the world (400,000 seats)

92% of attackers were external

Managed Secure Enterprise
Gateway (MSEG)

7 SOCs on 4 continents manage
security devices in 45 countries

52% of attacks involved Hacking

Vulnerability Scanning Service

Delivered 1500+ vulnerability mgmt
engagements in past 3 years

Universal Identity Services (UIS)

Manage digital identities in 50+
countries
& for 25+ national governments

Security Mgmt Program (SMP)

SMP is the oldest security certification
program in the industry

Rapid Response Retainer (RRR)

Handled 9 of the world’s 11 largest
data compromise investigations

Incident Analytics Service (IAS)

Analyzed 2500+ data breaches
involving more than 1 Billion records

76% of network intrusions exploited
weak or stolen credentials
75% of all attacks were opportunistic
(vs. targeted)
78% of attacks were of Low or Very
Low difficulty
82%: discovered by External party
36%: took weeks or more to contain
78%: took weeks or more to discover

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

15
WHAT DOES SMARTER SECURITY LOOK LIKE?

1. VERIS

STRATEGY BASED ON EVIDENCE
• Not FUD
2. DBIR

DON’T START
W/ PRODUCTS OR TOOLS
• Start with what’s worth protecting

3. IAS (“Custom DBIR”)

4. Security Monitoring

DON’T DEPLOY THE SECURITY
CONTROLS THAT SOUND
COMPELLING
• Deploy the security controls you
really need

DON’T FOCUS ON ALL THE DOTS
• Focus on the right dots
5. Security Enforcement

@smallersecurity
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

16
VERIZON’S SECURITY LEADERSHIP
INDUSTRY RECOGNITION
•
•
•
•

Large & highly rated MSSP (Frost & Sullivan, Gartner, Forrester)
Founding and Executive Member of Open Identity Exchange
Security Consulting practice recognized as a Strong Performer (Forrester)
ICSA Labs is the industry standard for certifying security products (started in 1991)

ISO 9001
ISO 17025

CREDENTIALS
• One of the largest PCI auditors (100+ QSAs) in the world
• Actively participate in 30+ standards / certification bodies, professional
organizations and vertical specific consortia
• Personnel hold 40+ unique industry, technology and vendor certifications

GLOBAL REACH
•
•
•
•

550+ dedicated security consultants in 28 countries speak 28 languages
Investigated breaches in 41 countries in 2011 and 2012
7 SOCs on 4 continents manage security devices in 45+ countries
Serve 77% of Forbes Global 2000

EXPERIENCE
•
•
•
•

Verizon’s SMP is the oldest security certification program in the industry
Analyzed 2500+ breaches involving 1+ Billion records
Manage identities in 50+ countries and for 25+ national governments
Delivered 5000+ security consulting engagements in the past 3 years

@smallersecurity
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

17

More Related Content

What's hot

How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
SBWebinars
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
Tony DeGonia (LION)
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
North Texas Chapter of the ISSA
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
NetIQ
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
CheapSSLsecurity
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
NetIQ
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
Fidelis Cybersecurity
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
Fidelis Cybersecurity
 

What's hot (20)

How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 

Similar to Smarter Security - A Practical Guide to Doing More with Less

Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
Richard Smiraldi
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
Richard Smiraldi
 
WE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's ResponsibilityWE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's Responsibility
Society of Women Engineers
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Amazon Web Services
 
whistle blowing.
whistle blowing.whistle blowing.
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionMichael Klein
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for Dummies
Liberteks
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
 
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...IntelCollab.com
 
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02Laurie Shook, MBA
 
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie ShookBlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
SocialMedia.org
 
The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
David Doret
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Syed Peer
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
Career Communications Group
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
 
Question 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docxQuestion 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docx
IRESH3
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 

Similar to Smarter Security - A Practical Guide to Doing More with Less (20)

Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
 
WE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's ResponsibilityWE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's Responsibility
 
PCI forensic investigations
PCI forensic investigations PCI forensic investigations
PCI forensic investigations
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for Dummies
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
 
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
 
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie ShookBlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
 
The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Question 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docxQuestion 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docx
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 

Recently uploaded

India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 

Recently uploaded (20)

India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 

Smarter Security - A Practical Guide to Doing More with Less

  • 2. 1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING THEORETICAL: Universe of bad things that can happen to anyone Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2
  • 3. 2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS ACTUAL: Bad things (color indicates frequency) that actually happened Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 3
  • 4. 3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR ORGANIZATION BE WORRIED ABOUT? THEORETICAL FOR YOU: bad things that are likely to happen to your organization if you have no protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 4
  • 5. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
  • 6. 5. What is the desired state? IDEAL FOR YOU: bad things that are likely to happen to your organization given you have sufficient protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 6
  • 8. VERIS VERIS is a (open and free) set of metrics designed to provide a common language for describing security incidents (or threats) in a structured and repeatable manner. Actor – Who did it? Action – How’d they do it? Asset – What was affected? Attribute – How was it affected? http://www.veriscommunity.net Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 8
  • 9. 1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING THEORETICAL: Universe of bad things that can happen to anyone Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 9
  • 10. 2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS ACTUAL: Bad things (color indicates frequency) that actually happened Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 10
  • 11. 3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR ORGANIZATION BE WORRIED ABOUT? THEORETICAL FOR YOU: bad things that are likely to happen to your organization if you have no protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 11
  • 12. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 12
  • 13. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 13
  • 14. 5. HOW DO YOU GET TO THE DESIRED STATE? 6 SECURITY SOLUTION AREAS: • Data Protection • Governance, Risk & Compliance • Identity & Access Mgmt • Investigative Response • Threat Mgmt (MSS) • Vulnerability Mgmt Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 14
  • 15. 5. HOW DO YOU GET TO THE DESIRED STATE? SOME SPECIFICS… DBIR FINDINGS VERIZON SOLUTIONS WHY VERIZON? 71%: victim didn’t know how much data was stolen Data Discovery (DDISC) Scanned 100,000,000+ files and discovered 1,000,000,000+ targeted data elements 61%: payment card data was stolen PCI Compliance More PCI auditors(140+ QSAs) than any other firm in the world 100%: data was exfilterated Data Loss Prevention (DLP) Led one of the largest DLP deployments in the world (400,000 seats) 92% of attackers were external Managed Secure Enterprise Gateway (MSEG) 7 SOCs on 4 continents manage security devices in 45 countries 52% of attacks involved Hacking Vulnerability Scanning Service Delivered 1500+ vulnerability mgmt engagements in past 3 years Universal Identity Services (UIS) Manage digital identities in 50+ countries & for 25+ national governments Security Mgmt Program (SMP) SMP is the oldest security certification program in the industry Rapid Response Retainer (RRR) Handled 9 of the world’s 11 largest data compromise investigations Incident Analytics Service (IAS) Analyzed 2500+ data breaches involving more than 1 Billion records 76% of network intrusions exploited weak or stolen credentials 75% of all attacks were opportunistic (vs. targeted) 78% of attacks were of Low or Very Low difficulty 82%: discovered by External party 36%: took weeks or more to contain 78%: took weeks or more to discover Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 15
  • 16. WHAT DOES SMARTER SECURITY LOOK LIKE? 1. VERIS STRATEGY BASED ON EVIDENCE • Not FUD 2. DBIR DON’T START W/ PRODUCTS OR TOOLS • Start with what’s worth protecting 3. IAS (“Custom DBIR”) 4. Security Monitoring DON’T DEPLOY THE SECURITY CONTROLS THAT SOUND COMPELLING • Deploy the security controls you really need DON’T FOCUS ON ALL THE DOTS • Focus on the right dots 5. Security Enforcement @smallersecurity Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 16
  • 17. VERIZON’S SECURITY LEADERSHIP INDUSTRY RECOGNITION • • • • Large & highly rated MSSP (Frost & Sullivan, Gartner, Forrester) Founding and Executive Member of Open Identity Exchange Security Consulting practice recognized as a Strong Performer (Forrester) ICSA Labs is the industry standard for certifying security products (started in 1991) ISO 9001 ISO 17025 CREDENTIALS • One of the largest PCI auditors (100+ QSAs) in the world • Actively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortia • Personnel hold 40+ unique industry, technology and vendor certifications GLOBAL REACH • • • • 550+ dedicated security consultants in 28 countries speak 28 languages Investigated breaches in 41 countries in 2011 and 2012 7 SOCs on 4 continents manage security devices in 45+ countries Serve 77% of Forbes Global 2000 EXPERIENCE • • • • Verizon’s SMP is the oldest security certification program in the industry Analyzed 2500+ breaches involving 1+ Billion records Manage identities in 50+ countries and for 25+ national governments Delivered 5000+ security consulting engagements in the past 3 years @smallersecurity Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 17

Editor's Notes

  1. For the latest version, please contact Omar KhawajaThe approach that follows intends to help organizations make the transition from thinking of security as a grouping of tools to a truly risk-based (and evidence-based) approach that has been preached for years, but one that continues to elude most organizations.
  2. 1. Most organizations worry about everything: the universe of bad things that can happen to anyone; this is one contributing factor to every security leader complaining about not have enough budget, time, resources, etc. to protect the organization. The problem is this:  they are trying to protect every asset, against every actor trying to expose every vulnerability… they are trying to boil the ocean. In order to address security, the problem needs to be more narrowly defined…
  3. This is in line with our approach to transition MSS from thousands of signatures to a few dozen Indicators of Compromise that are most likely2. In reality, only certain types of bad things actually happened across all organizations. Before worrying about the universe of the theoretical (see #1), organizations should make sure they have addressed the actual bad things that are happening.
  4. 3. Specifically, which bad things should your organization be worried about? Even better than worrying about every bad thing that happened to any organization (see #2), why not identify the specific bad things your organization should be worried about given: the types of data you have, your competitive environment, the geographies within which you operate, the people you may have made angry, etc.
  5. The basic stuff is important; do the basic before the sophisticated4. How well protected is your organization? Undoubtedly, every organization has some protection mechanisms in place. When you account for the protection offered by those, will have further reduced their risk (residual risk). Now, the organization knows exactly which areas require additional attention vs. which are sufficiently being addressed.
  6. 5. This is what nirvana looks like. We can’t remove the threats to our business (the dots will always be there), but we can ensure we are sufficiently protected to defend against them (the dots are green vs red or yellow). Address the red dots and yellow dots to turn them into green dots, by deploying (implementing and managing) the relevant security technologies, processes and training. Don’t apply any effort (resources, budget, thinking, sleepless nights, etc.) on white space or green dots prior to addressing the red and yellow dots.
  7. Is this real? How does this actually work?
  8. Confidentiality = data breachesAvailability = DoS Defense
  9. Threat library to monitor for key threats
  10. In reality, some risks will cost too much to mitigate / transfer; in these cases the best option will be to accept the risk (will stay red or yellow in perpetuity)Screenshot from Security Mgmt ProgramThreat library to monitor for key threatsSecurity Monitoring includes control validation too; Gracie = OG + RCMC = MSS + GRC
  11. 5. Address the red dots and yellow dots to turn them into green dots, by deploying (implementing and managing) the relevant security technologies, processes and training. Solve the problems you actually should be worried about vs. the ones that the vendor happens to have a robust solution for.
  12. Don’t need to be a CSO to get itUnderstood by the businessPoints products vs. Solutions Threat ProfilingChange SMP to … Security Monitoring + Ongoing Control Validation + Analytics = Vulns + Threats + AssetsOur security portfolio helps organization turn reds to yellows and yellows to greensNeed vs. Want
  13. For the latest version, please contact Omar KhawajaCREST approved penetration testerActively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortia