SlideShare a Scribd company logo
1 of 80
Download to read offline
1
The 7 Things I Know About
Cyber Security After 25 Years
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
2
RA F A L L O S
Head of Services Strategy & GTM at ExtraHop
~25 years in cyber security
Broad expertise in product and services
development, security strategy, and problem-solving
Podcaster
Down the Security Rabbithole Podcast
Writer and public speaker
Biography
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
3
“What makes you qualified to give this talk?”
These are all lessons I’ve learned, first-hand, the hard way
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
4
My 3 guiding principles
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
5
Change is relentless
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
6
crime pays
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
7
Security vs “human nature”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
8
1. You Don’t Want ZERO Risk
Check your math, and try again
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
9
business relies on taking risks
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
10
“Enigo Montoya” problem
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
11
security is a 1/x curve
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
12
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
13
you’re never getting to ZERO
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
14
at some point,
cost exceeds benefit
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
15
risk = probability x impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
16
don’t get fooled by chance
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
17
reducing risk, creates risk
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
18
either extreme is bad
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
19
2. Change the things you can
The magic quadrant of bad ideas
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
20
effort vs impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
21
low effort, high impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
22
low effort, low impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
23
high effort, high impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
24
high effort, low impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
25
law of diminishing returns
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
26
inverted hockey stick curve
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
27
“good ‘nuff”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
28
3. Today’s Feature, Tomorrow’s 0-Day
How did this even happen?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
29
security ← → innovation
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
30
today’s innovative idea…
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
31
..tomorrow’s critical flaw
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
32
so what happened?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
33
what is the right response?
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
34
triage vs prevent
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
35
“seemed like a good idea”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
36
plan for rapid triage
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
37
this will happen again
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
38
4. The “Great Awakening” Isn’t Coming
The “big one” happened, no one cared
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
39
“It’ll take a big incident…”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
40
nope
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
41
catastrophes are recoverable
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
42
business is resilient
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
43
we screwed up, big time
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
44
the sky fell, we still lived on
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
45
some become disillusioned
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
46
too many “don’t get it”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
47
now what?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
48
the hamster wheel is your
reality
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
49
5. Alt + Tab is a Hunter Killer
Smart does not scale
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
50
inverse proportionality
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
51
more screens
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
52
less security
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
53
your brain cannot correlate
(at scale)
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
54
platforms & integrations
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
55
ask the right questions
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
56
get better answers
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
57
tech isn’t magic
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
58
question
answer
analyze
act
analyze
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
59
6. DIY is Best Left on TV Shows
A fancy hammer does not a master carpenter make
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
60
re-inventing the same wheel
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
61
uniqueness is a weakness
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
62
patterns exist
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
63
expertise exists
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
64
what makes us do it
ourselves?
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
65
talent shortage (duh)
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
66
budget constraints
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
67
time/effort constraints
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
68
Most applicable in operations
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
69
accept limitations, and help
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
70
7. Stop Trying to Build Castles
We all basically live in the suburbs now anyway
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
71
castle as a metaphor
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
72
this metaphor aged poorly
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
73
we left the office
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
74
data went with us
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
75
clouds destroyed our models
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
76
sensitive data is everywhere
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
77
by use-case, or accident
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
78
security models must adapt
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
79
make data risk-resilient
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
80
Thank You
Thank You

More Related Content

Similar to The 7 Things I Know About Cyber Security After 25 Years | April 2024

The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 BarcelonaThe Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
Sce Pike
 
[Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring [Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring
Mintigo1
 

Similar to The 7 Things I Know About Cyber Security After 25 Years | April 2024 (19)

Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015
 
Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes
 
How to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social NetworksHow to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social Networks
 
How to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook PhotosHow to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook Photos
 
How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...
 
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
 
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 BarcelonaThe Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
 
WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020
 
[Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring [Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring
 
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
 
Check(mate) Your Bias: A game-driven approach to educating your team about ...
 Check(mate) Your Bias:  A game-driven approach to educating your team about ... Check(mate) Your Bias:  A game-driven approach to educating your team about ...
Check(mate) Your Bias: A game-driven approach to educating your team about ...
 
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
 
Behavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise CompaniesBehavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise Companies
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
 
Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411
 
Grassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich MintzGrassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich Mintz
 
How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...
 
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
 

More from Rafal Los

Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
Rafal Los
 

More from Rafal Los (20)

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

The 7 Things I Know About Cyber Security After 25 Years | April 2024

  • 1. 1 The 7 Things I Know About Cyber Security After 25 Years
  • 2. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 2 RA F A L L O S Head of Services Strategy & GTM at ExtraHop ~25 years in cyber security Broad expertise in product and services development, security strategy, and problem-solving Podcaster Down the Security Rabbithole Podcast Writer and public speaker Biography
  • 3. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 3 “What makes you qualified to give this talk?” These are all lessons I’ve learned, first-hand, the hard way
  • 4. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 4 My 3 guiding principles
  • 5. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 5 Change is relentless
  • 6. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 6 crime pays
  • 7. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 7 Security vs “human nature”
  • 8. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 8 1. You Don’t Want ZERO Risk Check your math, and try again
  • 9. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 9 business relies on taking risks
  • 10. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 10 “Enigo Montoya” problem
  • 11. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 11 security is a 1/x curve
  • 12. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 12
  • 13. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 13 you’re never getting to ZERO
  • 14. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 14 at some point, cost exceeds benefit
  • 15. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 15 risk = probability x impact
  • 16. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 16 don’t get fooled by chance
  • 17. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 17 reducing risk, creates risk
  • 18. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 18 either extreme is bad
  • 19. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 19 2. Change the things you can The magic quadrant of bad ideas
  • 20. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 20 effort vs impact
  • 21. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 21 low effort, high impact
  • 22. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 22 low effort, low impact
  • 23. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 23 high effort, high impact
  • 24. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 24 high effort, low impact
  • 25. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 25 law of diminishing returns
  • 26. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 26 inverted hockey stick curve
  • 27. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 27 “good ‘nuff”
  • 28. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 28 3. Today’s Feature, Tomorrow’s 0-Day How did this even happen?!
  • 29. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 29 security ← → innovation
  • 30. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 30 today’s innovative idea…
  • 31. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 31 ..tomorrow’s critical flaw
  • 32. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 32 so what happened?!
  • 33. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 33 what is the right response?
  • 34. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 34 triage vs prevent
  • 35. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 35 “seemed like a good idea”
  • 36. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 36 plan for rapid triage
  • 37. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 37 this will happen again
  • 38. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 38 4. The “Great Awakening” Isn’t Coming The “big one” happened, no one cared
  • 39. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 39 “It’ll take a big incident…”
  • 40. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 40 nope
  • 41. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 41 catastrophes are recoverable
  • 42. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 42 business is resilient
  • 43. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 43 we screwed up, big time
  • 44. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 44 the sky fell, we still lived on
  • 45. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 45 some become disillusioned
  • 46. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 46 too many “don’t get it”
  • 47. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 47 now what?!
  • 48. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 48 the hamster wheel is your reality
  • 49. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 49 5. Alt + Tab is a Hunter Killer Smart does not scale
  • 50. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 50 inverse proportionality
  • 51. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 51 more screens
  • 52. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 52 less security
  • 53. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 53 your brain cannot correlate (at scale)
  • 54. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 54 platforms & integrations
  • 55. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 55 ask the right questions
  • 56. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 56 get better answers
  • 57. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 57 tech isn’t magic
  • 58. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 58 question answer analyze act analyze
  • 59. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 59 6. DIY is Best Left on TV Shows A fancy hammer does not a master carpenter make
  • 60. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 60 re-inventing the same wheel
  • 61. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 61 uniqueness is a weakness
  • 62. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 62 patterns exist
  • 63. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 63 expertise exists
  • 64. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 64 what makes us do it ourselves?
  • 65. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 65 talent shortage (duh)
  • 66. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 66 budget constraints
  • 67. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 67 time/effort constraints
  • 68. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 68 Most applicable in operations
  • 69. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 69 accept limitations, and help
  • 70. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 70 7. Stop Trying to Build Castles We all basically live in the suburbs now anyway
  • 71. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 71 castle as a metaphor
  • 72. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 72 this metaphor aged poorly
  • 73. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 73 we left the office
  • 74. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 74 data went with us
  • 75. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 75 clouds destroyed our models
  • 76. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 76 sensitive data is everywhere
  • 77. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 77 by use-case, or accident
  • 78. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 78 security models must adapt
  • 79. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 79 make data risk-resilient
  • 80. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 80 Thank You Thank You