SlideShare a Scribd company logo
1 of 22
Download to read offline
Ultimate Hack
                      Manipulating Layers 8 & 9 [Management & Budget] of the OSI Model


Rafal M. Los ...aka „Wh1t3Rabbit“
AtlSecCon – March 201 1


© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Hi …I’m the Wh1t3 Rabbit
Twitter: “Wh1t3Rabbit”
Blog:    http://hp.com/go/white-rabbit

Practical Experience?
•IT since 1995
•InfoSec since 1999
•Built & led AppSec Program in Fortune 100
•More years doing then talking

© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Rules for this talk
(seriously)

CAUTION: The contents in                                               1. Participate
this talk may make you
uncomfortable as an
                                                                       2. Share your thoughts
information security                                                   3. If you share, be honest with your
professional.                                                             answers
                                                                       4. There is an assignment at the end…


 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
 contained herein is subject to change without notice. Confidentiality label goes here
A riddle:
What does an Information Security
team DO?

© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Does senior
                                                                                        management respect
                                                                                        and support
                                                                                        Information Security‟s
                                                                                        vision & efforts?


                                                                                           …or just deal
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here      with you?
Our Goal as InfoSec Professionals
(what we tell ourselves)


•“secure the business”
•“reduce risk”
•“deploy security measures”
•“protect the company”
•“keep threats out”

6   © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
    contained herein is subject to change without notice. Confidentiality label goes here
Our Goal as InfoSec Professionals
When management hears this…


•“secure the business”  from what?
•“reduce risk”  of what?
•“deploy security measures”  why?
•“protect the company”  from what?
•“keep threats out”  of where? (and why?)

7   © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
    contained herein is subject to change without notice. Confidentiality label goes here
Layers 8 & 9
“the secret layers”

Management                                                                                Budget

                             necessary for…                                                            necessary for…

•Organizational buy-in                                                                    •Required for staff, gear
•Push change from the top                                                                 •Persuasion
•Create shift in policy & culture                                                         •Education
•Credibility                                                                              •Seed effort

  © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
  contained herein is subject to change without notice. Confidentiality label goes here
So … you NEED
                                                                                        Management &
                                                                                        Budget
                                                                                         …but how do
                                                                                        you manipulate
                                                                                        them to your
                                                                                        ends?
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Getting what you want at
                                   Layers 8 & 9
My 7 Secrets to Success



© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Align to the Business
What does your business do?

Objective                                                                Situation
Understand completely                                                    Many IT Security Pros do not know business drivers
and comprehensively                                                      • Align to your business or organizational goals
what your organization                                                        – Compliance with government regulations may be a goal
                                                                              – Expanding into new markets may be a goal
does, how it makes
                                                                              – Developing a new prototype may be a goal
money, and how it
                                                                         • Drive security like it was a „business‟
evolves.
                                                                              – Understand cause:effect of security policy & vision
                                                                              – Don‟t spend $10M to protect $100k


11 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Walk a mile...
Go work as a business analyst

Objective                                                                Situation
If you want to                                                           Understand the situations you are working against
understand why business                                                  • Security must truly understand the motivations that
analysts do                                                                drive business decisions and employees
strange/insecure things –                                                     – Security analysts must work in the business
                                                                              – Understand „how it works‟ and what drives non-IT Security
go be one of them for a
                                                                              – “Feel their pain”
while.
                                                                         • I promise you will have a different outlook
                                                                              – Understand the business, protect its assets rationally


12 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Carrot & Stick
Rewards balance consequences

Objective                                                                Situation
Neither rewards, or                                                      You can lead a horse to water, even put him IN water…
consequences alone will                                                  • Do better than “because security says so”
reach your ends; a sane                                                       – People avoid you because they can and will get away with it
                                                                              – Policy is a weak motivational tool
balance must be found
between push and pull of                                                 • Offer incentives to make „secure‟ choices
                                                                              – Rewards, recognition, positive reinforcement
your security goals.
                                                                         • Severely punish blatant detractors
                                                                              – Approve severe punishment (firing?) through HR, enforce it.

                                                                                           *Blog post http://h30501.www3.hp.com/t5/Following-the-
                                                                                           White-Rabbit-A/The-Path-of-Least-Resistance/ba-p/22011
13 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Advisory vs. Operations
Segment your security practice

Objective                                                                Situation
Separate our the ‘advise’                                                Split the organization to optimize efficiencies
from the ‘do’ parts of                                                   • Operational tasks move out to small operations team
Information Security to                                                       – Managing anti-virus, patches, IDM, firewall rules, etc
                                                                              – Manage the „doers‟, validate with small nimble team
achieve higher credibility
and better resource                                                      • Shift majority of team to advisory capacity
                                                                              – Much like internal consultants- provide sound advice, let others do
utilization.
                                                                              – Formulate & dictate policy, push to ops teams to implement
                                                                         • Great cost efficiencies here, dynamic efficiencies

14 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Risk, Compliance, Legal
Meet your new best friends

Objective                                                                Situation
Align with the 3 most                                                    IT Security is not unlike legal, risk and compliance
powerful parts of any                                                    • Get to know the practices of these departments
organization; adopt their                                                     – Understand their motivations and power capabilities
                                                                              – Understand their struggles with reaching goals
methods and leverage
                                                                                o Offer    technology-based approaches to their ills
each others capabilities
                                                                         • Leverage each others strengths to drive key strategy
and expertise.
                                                                              – What is good for me, is good for „we‟
                                                                              – Security‟s goals can often be accomplished by legal‟s requirements


15 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Business-driven ’security’
Business must need it

Objective                                                                Situation
Allow your business to                                                   You CAN NOT force security onto an organization
come to the conclusion                                                   • Provide advisory assessments of IT risk to the
that it requires your                                                      organization as appropriate
assistance to meet                                                            – Define the appropriate format for your industry, market
                                                                              – Make reports readily available to customers, auditors
business goals and
                                                                              – Allow constituents to choose from approved remediation options
customer demands.
                                                                         • Offer a lower-cost, consolidated alternative to
                                                                           continually failing audit, scrambling to comply

16 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Leverage Accountability
“Just sign here to accept risk”

Objective                                                                Situation
Few things are more                                                      Accountability in a visible way is fundamental
powerful than the risk of                                                • Provide objective assessment of risk
being held accountable                                                        – Research, then file a comprehensive risk profile report
                                                                              – Discuss the impact, cost, and assessed risk to the organization
for your actions; advise
on risk and allow a                                                      • Give leaders the ability to choose
                                                                              – Accept risk on behalf of the organization
business owner to accept
                                                                                o Sign     off on the risk (literally) and get reported
that risk with a simple                                                       – Remediate the risks
signature.
17 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
Measure Yourself (KPIs)
How do you know you‟ve succeeded?

Objective                                                                Situation
There are no more than 5                                                 Can you measure security‟s true impact?
KPIs you must measure                                                    • Most organizations have lots of data & metrics
against; KPIs enable a                                                        – Metrics rarely tell a big picture
                                                                              – Spreadsheets, dashboards are often too complex and technical
non-technical
conversation with                                                        • Do your KPIs pass the “so what?” test?
                                                                              – Does it impact the business?
management &
                                                                              – Does it impact revenue?
leadership.                                                                   – Are you improving proportionately to fiscal spend?


18 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
The Most Important Answer
If you want to shock your CIO, answer this question


   When can we stop
   spending money?
                                                       When have you achieved a „good enough‟ state of IT risk?
                                                          •Who defines and accepts those parameters?
                                                          •How does security contribute to „good enough‟?
                                                          •Can you tell the CIO when to stop spending?
19 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
These are my secrets to succeeding
They‟ve worked for me, they may work for you


Try this at home ...but make sure you are rational.

• There is no silver bullet, we‟re not baking cookies
• Every organization is different, approaches vary
    –Some assembly required, batteries not included
    –No warranties, no returns



20 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information
   contained herein is subject to change without notice. Confidentiality label goes here
A smart poker player
                                                                                        knows…
                                                                                            •when to hold
                                                                                            •when to fold
                                                                                            •when to walk away
                                                                                            •when to run like hell.




© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. Confidentiality label goes here
Thank you
Did you learn something?




                                                                                        Rafal Los
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information
                                                                                        Twitter.com/Wh1t3Rabbit
contained herein is subject to change without notice. Confidentiality label goes here
                                                                                        HP.com/go/white-rabbit

More Related Content

Similar to Ultimate Hack! Layers 8 & 9 of the OSI Model

Power the Connected Enterprise with Cloud Integration and Master Data Managem...
Power the Connected Enterprise with Cloud Integration and Master Data Managem...Power the Connected Enterprise with Cloud Integration and Master Data Managem...
Power the Connected Enterprise with Cloud Integration and Master Data Managem...Darren Cunningham
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...MarketBridge
 
Ntt Data Advisory & Interactive 20120529
Ntt Data Advisory & Interactive 20120529Ntt Data Advisory & Interactive 20120529
Ntt Data Advisory & Interactive 20120529Dana Helland
 
It economist
It economistIt economist
It economistronpoul
 
Alternative Work Area in BCM
Alternative Work Area in BCMAlternative Work Area in BCM
Alternative Work Area in BCMOmniComm
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
EIS-Webinar-MDM-Personalization-2023-03-15.pdf
EIS-Webinar-MDM-Personalization-2023-03-15.pdfEIS-Webinar-MDM-Personalization-2023-03-15.pdf
EIS-Webinar-MDM-Personalization-2023-03-15.pdfEarley Information Science
 
Using Agile and Lean to Stay Ahead in a Tough Economy
Using Agile and Lean to Stay Ahead in a Tough EconomyUsing Agile and Lean to Stay Ahead in a Tough Economy
Using Agile and Lean to Stay Ahead in a Tough EconomySally Elatta
 
Leadership In Product Management
Leadership In Product ManagementLeadership In Product Management
Leadership In Product ManagementSVPMA
 
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...InSync Conference
 
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...IBM Sverige
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewStephen Lahanas
 
How to get value from your multi-channel lead gen programme - Cyance
 How to get value from your multi-channel lead gen programme - Cyance How to get value from your multi-channel lead gen programme - Cyance
How to get value from your multi-channel lead gen programme - CyanceB2B Marketing
 
Value Chain Road Map General Approach
Value Chain Road Map General ApproachValue Chain Road Map General Approach
Value Chain Road Map General Approachmwahadneh
 
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...Greg Clark
 
B2B Marketing Summit Lead Nurturing
B2B Marketing Summit Lead Nurturing B2B Marketing Summit Lead Nurturing
B2B Marketing Summit Lead Nurturing cyancemarketing
 
Agile, IT and the Business Community
Agile, IT and the Business CommunityAgile, IT and the Business Community
Agile, IT and the Business CommunityWilliam F. Nazzaro
 

Similar to Ultimate Hack! Layers 8 & 9 of the OSI Model (20)

Power the Connected Enterprise with Cloud Integration and Master Data Managem...
Power the Connected Enterprise with Cloud Integration and Master Data Managem...Power the Connected Enterprise with Cloud Integration and Master Data Managem...
Power the Connected Enterprise with Cloud Integration and Master Data Managem...
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...
Crunching “Big Data” to Drive 2012 Revenue Growth: The 5 Myths of Sales & Mar...
 
Ntt Data Advisory & Interactive 20120529
Ntt Data Advisory & Interactive 20120529Ntt Data Advisory & Interactive 20120529
Ntt Data Advisory & Interactive 20120529
 
It economist
It economistIt economist
It economist
 
Alternative Work Area in BCM
Alternative Work Area in BCMAlternative Work Area in BCM
Alternative Work Area in BCM
 
Inno Flux Presentation
Inno Flux  PresentationInno Flux  Presentation
Inno Flux Presentation
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
EIS-Webinar-MDM-Personalization-2023-03-15.pdf
EIS-Webinar-MDM-Personalization-2023-03-15.pdfEIS-Webinar-MDM-Personalization-2023-03-15.pdf
EIS-Webinar-MDM-Personalization-2023-03-15.pdf
 
Using Agile and Lean to Stay Ahead in a Tough Economy
Using Agile and Lean to Stay Ahead in a Tough EconomyUsing Agile and Lean to Stay Ahead in a Tough Economy
Using Agile and Lean to Stay Ahead in a Tough Economy
 
Leadership In Product Management
Leadership In Product ManagementLeadership In Product Management
Leadership In Product Management
 
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...
Integrating obiee & essbase with your data warehouse strategy in sync10 oracl...
 
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
 
How to get value from your multi-channel lead gen programme - Cyance
 How to get value from your multi-channel lead gen programme - Cyance How to get value from your multi-channel lead gen programme - Cyance
How to get value from your multi-channel lead gen programme - Cyance
 
Value Chain Road Map General Approach
Value Chain Road Map General ApproachValue Chain Road Map General Approach
Value Chain Road Map General Approach
 
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...
AIIM West - Built for Success - Creating an Effective IM Org Structure - 2012...
 
B2B Marketing Summit Lead Nurturing
B2B Marketing Summit Lead Nurturing B2B Marketing Summit Lead Nurturing
B2B Marketing Summit Lead Nurturing
 
Agile, IT and the Business Community
Agile, IT and the Business CommunityAgile, IT and the Business Community
Agile, IT and the Business Community
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 

More from Rafal Los

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfRafal Los
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityRafal Los
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)Rafal Los
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security MetricsRafal Los
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning warsRafal Los
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013Rafal Los
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rafal Los
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Rafal Los
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Rafal Los
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationRafal Los
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Rafal Los
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Rafal Los
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0Rafal Los
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Rafal Los
 

More from Rafal Los (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Ultimate Hack! Layers 8 & 9 of the OSI Model

  • 1. Ultimate Hack Manipulating Layers 8 & 9 [Management & Budget] of the OSI Model Rafal M. Los ...aka „Wh1t3Rabbit“ AtlSecCon – March 201 1 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 2. Hi …I’m the Wh1t3 Rabbit Twitter: “Wh1t3Rabbit” Blog: http://hp.com/go/white-rabbit Practical Experience? •IT since 1995 •InfoSec since 1999 •Built & led AppSec Program in Fortune 100 •More years doing then talking © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 3. Rules for this talk (seriously) CAUTION: The contents in 1. Participate this talk may make you uncomfortable as an 2. Share your thoughts information security 3. If you share, be honest with your professional. answers 4. There is an assignment at the end… © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 4. A riddle: What does an Information Security team DO? © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 5. Does senior management respect and support Information Security‟s vision & efforts? …or just deal © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here with you?
  • 6. Our Goal as InfoSec Professionals (what we tell ourselves) •“secure the business” •“reduce risk” •“deploy security measures” •“protect the company” •“keep threats out” 6 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 7. Our Goal as InfoSec Professionals When management hears this… •“secure the business”  from what? •“reduce risk”  of what? •“deploy security measures”  why? •“protect the company”  from what? •“keep threats out”  of where? (and why?) 7 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 8. Layers 8 & 9 “the secret layers” Management Budget necessary for… necessary for… •Organizational buy-in •Required for staff, gear •Push change from the top •Persuasion •Create shift in policy & culture •Education •Credibility •Seed effort © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 9. So … you NEED Management & Budget …but how do you manipulate them to your ends? © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 10. Getting what you want at Layers 8 & 9 My 7 Secrets to Success © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 11. Align to the Business What does your business do? Objective Situation Understand completely Many IT Security Pros do not know business drivers and comprehensively • Align to your business or organizational goals what your organization – Compliance with government regulations may be a goal – Expanding into new markets may be a goal does, how it makes – Developing a new prototype may be a goal money, and how it • Drive security like it was a „business‟ evolves. – Understand cause:effect of security policy & vision – Don‟t spend $10M to protect $100k 11 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 12. Walk a mile... Go work as a business analyst Objective Situation If you want to Understand the situations you are working against understand why business • Security must truly understand the motivations that analysts do drive business decisions and employees strange/insecure things – – Security analysts must work in the business – Understand „how it works‟ and what drives non-IT Security go be one of them for a – “Feel their pain” while. • I promise you will have a different outlook – Understand the business, protect its assets rationally 12 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 13. Carrot & Stick Rewards balance consequences Objective Situation Neither rewards, or You can lead a horse to water, even put him IN water… consequences alone will • Do better than “because security says so” reach your ends; a sane – People avoid you because they can and will get away with it – Policy is a weak motivational tool balance must be found between push and pull of • Offer incentives to make „secure‟ choices – Rewards, recognition, positive reinforcement your security goals. • Severely punish blatant detractors – Approve severe punishment (firing?) through HR, enforce it. *Blog post http://h30501.www3.hp.com/t5/Following-the- White-Rabbit-A/The-Path-of-Least-Resistance/ba-p/22011 13 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 14. Advisory vs. Operations Segment your security practice Objective Situation Separate our the ‘advise’ Split the organization to optimize efficiencies from the ‘do’ parts of • Operational tasks move out to small operations team Information Security to – Managing anti-virus, patches, IDM, firewall rules, etc – Manage the „doers‟, validate with small nimble team achieve higher credibility and better resource • Shift majority of team to advisory capacity – Much like internal consultants- provide sound advice, let others do utilization. – Formulate & dictate policy, push to ops teams to implement • Great cost efficiencies here, dynamic efficiencies 14 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 15. Risk, Compliance, Legal Meet your new best friends Objective Situation Align with the 3 most IT Security is not unlike legal, risk and compliance powerful parts of any • Get to know the practices of these departments organization; adopt their – Understand their motivations and power capabilities – Understand their struggles with reaching goals methods and leverage o Offer technology-based approaches to their ills each others capabilities • Leverage each others strengths to drive key strategy and expertise. – What is good for me, is good for „we‟ – Security‟s goals can often be accomplished by legal‟s requirements 15 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 16. Business-driven ’security’ Business must need it Objective Situation Allow your business to You CAN NOT force security onto an organization come to the conclusion • Provide advisory assessments of IT risk to the that it requires your organization as appropriate assistance to meet – Define the appropriate format for your industry, market – Make reports readily available to customers, auditors business goals and – Allow constituents to choose from approved remediation options customer demands. • Offer a lower-cost, consolidated alternative to continually failing audit, scrambling to comply 16 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 17. Leverage Accountability “Just sign here to accept risk” Objective Situation Few things are more Accountability in a visible way is fundamental powerful than the risk of • Provide objective assessment of risk being held accountable – Research, then file a comprehensive risk profile report – Discuss the impact, cost, and assessed risk to the organization for your actions; advise on risk and allow a • Give leaders the ability to choose – Accept risk on behalf of the organization business owner to accept o Sign off on the risk (literally) and get reported that risk with a simple – Remediate the risks signature. 17 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 18. Measure Yourself (KPIs) How do you know you‟ve succeeded? Objective Situation There are no more than 5 Can you measure security‟s true impact? KPIs you must measure • Most organizations have lots of data & metrics against; KPIs enable a – Metrics rarely tell a big picture – Spreadsheets, dashboards are often too complex and technical non-technical conversation with • Do your KPIs pass the “so what?” test? – Does it impact the business? management & – Does it impact revenue? leadership. – Are you improving proportionately to fiscal spend? 18 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 19. The Most Important Answer If you want to shock your CIO, answer this question When can we stop spending money? When have you achieved a „good enough‟ state of IT risk? •Who defines and accepts those parameters? •How does security contribute to „good enough‟? •Can you tell the CIO when to stop spending? 19 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 20. These are my secrets to succeeding They‟ve worked for me, they may work for you Try this at home ...but make sure you are rational. • There is no silver bullet, we‟re not baking cookies • Every organization is different, approaches vary –Some assembly required, batteries not included –No warranties, no returns 20 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 21. A smart poker player knows… •when to hold •when to fold •when to walk away •when to run like hell. © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Confidentiality label goes here
  • 22. Thank you Did you learn something? Rafal Los © Copyright 2011 Hewlett-Packard Development Company, L.P. The information Twitter.com/Wh1t3Rabbit contained herein is subject to change without notice. Confidentiality label goes here HP.com/go/white-rabbit