Top Banner
Keeping First Things First: Maintaining a security focus in a media-driven world
49

Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Mar 28, 2018

Download

Documents

doquynh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Keeping First Things First: Maintaining a security focus in a media-driven world

Page 2: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

First, let’s define our

terms….

Page 3: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 4: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

What concerns us in security?

Page 5: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

What concerns us in security?

Keeping sensitive data secure, regardless where it is

stored

System integrity – patches and configuration

Keeping critical systems available

Page 6: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

The Principles of good

security haven’t changed in

2,000 years A little history lesson….

Page 7: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Managing the Roman Army

The Imperial Roman Army of AD 30-248 was a standing

professional army

Mostly heavy infantry, also Calvary sailors and marines

At its peak, consisted of over ~400,000 men (c: 3rd century)

The Praetorian Guard

The “special forces” of the Roman Army

Bodyguards of the Roman Emperors

Patrolled the palace and other important buildings

Page 8: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

What was important

Confidentiality of messages

Page 9: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

"Skytala&EmptyStrip-Shaded". Licensed under CC BY-SA 3.0 via Wikimedia Commons - https://commons.wikimedia.org/wiki/File:Skytala%26EmptyStrip-Shaded.png#/media/File:Skytala%26EmptyStrip-Shaded.png

Page 10: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

The scytale transposition cipher

Page 11: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

What was important

Confidentiality of messages

Accuracy and speed of information

Troop strength

Position

Status of supplies

Page 12: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

All roads lead to Rome…

Page 13: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Cursus Publicus

“the public way” δημόσιος δρόμος - dēmósios drómos

Courier service of the Roman Empire

Created by the Emperor Augustus

Used to transport official messages, tax revenues, and

some military communications

Page 14: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

What was important

Confidentiality of messages

Accuracy and speed of information

Integrity of messages

Page 15: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Seal boxes

Bronze boxes used in combination with wax and a seal

(ring or other device) used to ensure the integrity of a

message

Page 16: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

The information security challenges

faced by the Roman Army are the same

challenges we face today…

except…..

Page 17: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

….The Romans didn’t have to deal with…

Page 18: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How does the media drive the

security discussion?

Sensationalism….

http://www.pcworld.com/article/2859283/heartbleed-shellshock-and-tor-the-13-biggest-security-stories-of-

2014.html

Page 19: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How does the media drive the

security discussion?

Sensationalism….

Dramatic predictions….

http://arstechnica.com/security/2014/11/potentially-catastrophic-bug-bites-all-versions-of-windows-patch-

now/of-2014.html

Page 20: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How does the media drive the

security discussion?

Sensationalism….

Dramatic predictions….

http://www.huffingtonpost.com/peter_schwartz/end-of-internet_b_5856168.html

Page 21: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How does the media drive the

security discussion?

Sensationalism….

Dramatic predictions….

http://www.darkreading.com/risk-management/the-(not-quite)-end-of-security-on-the-internet/d/d-

id/1075199?

Page 22: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How does the media drive the

security discussion?

Sensationalism….

Dramatic predictions….

If it bleeds it leads….

http://www.bbc.com/news/technology-269545401075199?

Page 23: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Making tech sound scary…

CVE-2015-1538

CVE-2015-1539, CVE-2015-3824, CVE-2015-3826,

CVE-2015-3827, CVE-2015-3828 and CVE-2015-3829

Android “Stagefright”

Page 24: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Doom and gloom that never

really panned out…

Page 25: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 26: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 27: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 28: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Even at DEFCON (2013)

Page 29: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Even at DEFCON (2013)

Page 30: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Let’s take a trip in the “way

back” machine…

Page 31: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 32: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 33: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 34: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

(Some of the)

Top Security Stories of 2014 According to PCWord.com

“The 13 Most Momentous Security Stories of 2014”

Page 35: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Sony Pictures Hack

Probably North Korean hackers

Stole employee data

Another breach of names, SSNs, salary data

General Internet security impact: Low

Page 36: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Heartbleed

Two year old, previously unidentified bug in OpenSSL

Very few confirmed data breaches

“Heartbleed forced millions of people to change their

passwords across a variety of websites.”

(In reality, it forced thousands of security professionals to spend

thousands of hours explaining to server admins why they had to put in a

patch over the weekend)

General Internet security impact: Moderate

Page 37: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Shellshock

Vulnerability in BASH (born again shell)

Fairly serious remote code vulnerability

No significant number of known compromises

General Internet security impact: Moderate

Page 38: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

The Death of TrueCrypt

Who cares?

Only security geeks use it

Several other options available (VeraCrypt)

General Internet security impact: Nil

Page 39: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Bad USB

Security researchers discovered a way to re-program USB

firmware

Could turn a UDB drive in to a keylogger or malware delivery

mechanism

Could be bad if someone breaks into Kingston, PNY, SanDisk,

or Lexar

Only my daughter uses a USB drive to store her homework

Oh, wait, ISACA distributes Geek Week presentations on a USB

drive

General Internet security impact: Low

Page 40: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

So what should we really care

about?

Page 41: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

My Top Five

Page 42: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Software/web app security

“If planes, trains, automobiles were built with the

same quality enterprise applications were built, we’d

all be dead by now.”

Vulnerability testing

Secure coding practices

Baking in security, not bolting on later

Page 43: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

The Internet of Things

“Experts estimate that the IoT will consist of almost 50

billion objects by 2020.”

Does Maytag have secure coding practices for their

network-connected refrigerator?

Is Symantec planning on deploying anti-malware

security for your washing machine?

A BotNet of 50 billon is scary!

(Yeah, that’s a little sensational)

Page 44: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Data, data, everywhere

“The interesting thing about cloud computing is that

we’ve redefined cloud computing to include everything

that we already do. I can’t think of anything that isn’t

cloud computing with all of these announcements.” (Larry Ellison)

The traditional perimeter is gone

Security must focus on the protecting the data, not

just the systems

Who has access, when, from where, and what are

they doing?

Page 45: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

“We don’t need no stinkin’

patches!”

Patches & configuration management

Application dependencies keeping

upgrades from happening

Poor asset management

Not knowing what you have

and it’s current state

Page 46: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Monitoring, Threat Sharing, and

Indicators of Compromise

What are you doing to detect potential (or actual) data

breaches?

Are you subscribing to threat-intelligence data feeds?

Do you have adequate data and network monitoring

tools?

Do you participate in industry-specific

information sharing?

“75% of attacks spread from Victim 0 to

Victim 1 within one day (24 hours).” (Verizon DBIR 2014)

Page 47: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

Monitoring

Source: Verizon DBIR, 2014

Page 48: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns
Page 49: Keeping First Things First - ISACA First Things First: Maintaining a security focus in a media-driven world First, let’s define our terms…. What concerns us in security? What concerns

How to maintain focus…

Build relationships within a professional network of trusted partners

Subscribe to closed source threat feeds

Use reliable sources for security information, not bloggers or the media

Figure out what threats will affect your business the most and focus on those!

Write them down

Update periodically

Establish a “risk tolerance”

Keep the fundamentals of security in mind