Top Banner
39

Metrics evolution breakfast edition

Aug 04, 2015

Download

Technology

infosecresearch
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Metrics evolution breakfast edition
Page 2: Metrics evolution breakfast edition

YOUR SPEAKER – • 2014 HEAD OF INFORMATION SECURITY – WORLDLINE (ATOS GROUP)

• 2014 CISO LEVEL SECURITY, RISK & COMPLIANCE CONSULTANCY ACROSS EUROPE

• 2013 PCIDSS COMPLIANCE AT WALMART FOR ASDA & GEORGE (LEVEL ONE MERCHANT)

• 2011 - 2013 PCIDSS COMPLIANCE MANCHESTER AIRPORTS GROUP (LEVEL THREE MERCHANT)

• 2006-2011 PCIDSS COMPLIANCE HOMELOAN MANAGEMENT LIMITED (LEVEL ONE SERVICE PROVIDER)

• 2006 ECOMMERCE SECURITY– THOMAS COOK SCHEDULED BUSINESS

Page 3: Metrics evolution breakfast edition

EXEC SUMMARY

• QUICK LOOK BACK OVER LAST TEN YEARS

• QUICK LOOK AT MY FAVOURITE BACKGROUND READING

• AT A FORK IN THE ROAD - KPI V SECVIZ

Page 4: Metrics evolution breakfast edition

Looking Back…

35

Page 5: Metrics evolution breakfast edition

INTRODUCTION (FROM 2003)

• IT SECURITY METRICS PROVIDE A PRACTICAL APPROACH TO MEASURING

INFORMATION SECURITY.

• EVALUATING SECURITY AT THE SYSTEM LEVEL, IT SECURITY METRICS ARE TOOLS THAT

FACILITATE DECISION MAKING AND ACCOUNTABILITY THROUGH COLLECTION,

ANALYSIS, AND REPORTING OF RELEVANT PERFORMANCE DATA.

34

Page 6: Metrics evolution breakfast edition

OLD SCHOOL METRICS TUTORIAL

• DAN GEER

• 426 PAGES

• 2007

• GEER - HTTP://GEER.TINHO.NET/MEASURINGSECURITY.TUTORIAL.PDF

33

Page 7: Metrics evolution breakfast edition

NIST SPECIAL PAPER

• NIST SP800 SERIES

• TECH STANDARDS

• US GOV

• 2008

32

Page 8: Metrics evolution breakfast edition

CIS CONSENSUS ON IS METRICS

• HTTPS://BENCHMARKS.CISECURITY.ORG/DOWNLOADS/METRICS/

31

Page 9: Metrics evolution breakfast edition

GOOD BOOKS • THERE ARE PLENTY OF BOOKS OUT THERE – NEW ONES BEING PUBLISHED ALL THE TIME

• CAROLYN WONG -2011

• LANCE HAYDEN -2010

30

Page 10: Metrics evolution breakfast edition

WWW.SANS.ORG READING ROOM

• FAVOURITE DASHBOARD PAPER

• 2010

29

Page 11: Metrics evolution breakfast edition

SANS PAPER • EXAMPLES

28

Page 12: Metrics evolution breakfast edition

Know your enemy

27

Page 13: Metrics evolution breakfast edition

HOW TO LIE WITH STATISTICS 1954

• DARRELL HUFF

26

Page 14: Metrics evolution breakfast edition

HUFF HTLWS

• 2009

• AND NEW

• HTTP://CSEWEB.UCSD.EDU/~RICKO/CSE3/LIE_WITH_STATISTICS.PDF

25

Page 15: Metrics evolution breakfast edition

24

Page 16: Metrics evolution breakfast edition

BLACK HAT 2013 - TALK

• STEVE CHRISTIE

• BRIAN MARTIN

23

Page 17: Metrics evolution breakfast edition

BLACK HAT TALK – UPDATE 2015

• HTTP://BLOG.OSVDB.ORG/CATEGORY/VULNERABILITY-STATISTICS/

22

Page 18: Metrics evolution breakfast edition

Sample

21

Page 19: Metrics evolution breakfast edition

Why Vulnerability Stats Suck • Stats are presented without understanding the limits of the data

• Even if explanations are provided, correlation is confused with causation:

20

Page 20: Metrics evolution breakfast edition

Talking Points

• Defining Bias

• Researcher Bias

• Vendor Bias

• VDB Bias

• Bad Stats

• Good(ish) Stats

• Conclusion

19

Page 21: Metrics evolution breakfast edition

Disease Research: Epidemiology vs. Vulnerability Research

Epidemiology Vulnerability Research

Goal Improve the public health SAVE ALL THE THINGZ ON THA INTERWEBZ! * (attention whoring)

Objects of Study People/Diseases Software/Vulnerabilities

Populations Groups of people Groups of vulnerabilities (as seen in multi-vuln disclosures)

Measurement Devices (Tools of the Trade)

Blood pressure monitors, thermometers, lab tests, observation

Automated code scanners w/high FP/FN rates, fuzzers, coffee-fueled malcontents staring at code at 3 AM

Publication Requirements

Refereed journals with peer review Ability to send email

Sampling Methods Using industry established methodologies and formal documentation.

Using wildly erratic methodologies, no standards for documentation or disclosure

* Goal not shared by all researchers. Please to be rolling with this, kthxbye

18

Page 22: Metrics evolution breakfast edition

The Shocking Claim

• Bias and statistics in vulnerability research are far worse than it is in other disciplines

• At least people don’t die (yet?), but still use vulnerable equipment:

– SCADA

– Airplanes

– Automobiles

– Medical Devices

– Oh my…

17

Page 23: Metrics evolution breakfast edition

KPI / KRI

16

Page 24: Metrics evolution breakfast edition

SECURITY EFFORT / PERFORMANCE

• WITH KRI

15

Page 25: Metrics evolution breakfast edition

SECURITY EFFORT / PERFORMANCE

• WITH KPI

14

Page 26: Metrics evolution breakfast edition

lets get visual

13

Page 27: Metrics evolution breakfast edition

THE BOOKS • APPLIED SECURITY VISUALIZATION DATA-DRIVEN SECURITY

12

Page 28: Metrics evolution breakfast edition

SECVIZ AND AFTERGLOW

• SITE WWW.SECVIZ.ORG AND TOOL AFTERGLOW (PERL)

11

Page 29: Metrics evolution breakfast edition

DATA DRIVEN SECURITY BLOG/PODCAST

10

Page 30: Metrics evolution breakfast edition

INDEPENDENT REVIEW OF DDS • HTTP://HOLISTICINFOSEC.ORG/TOOLSMITH/PDF/SEPTEMBER2014.PDF

9

Page 31: Metrics evolution breakfast edition

THE OTHER DATA DRIVEN SECURITY • HTTPS://WWW.TRUSTWORTHYINTERNET.ORG/DATA-DRIVEN-SECURITY/

8

Page 32: Metrics evolution breakfast edition

PATERVA MALTEGO TRANSFORM TOOL • MALWARE INVESTIGATIONS EXAMPLES

2010 2013 2014

7

Page 33: Metrics evolution breakfast edition

CROWDSTRIKE – DEEP PANDA

6

Page 34: Metrics evolution breakfast edition

OPENDNS VIDEO AND GRAPHICS • HTTPS://WWW.OPENDNS.COM/2013

• HTTPS://WWW.OPENDNS.COM/2014

5

Page 35: Metrics evolution breakfast edition

OPENDNS FREE TOOLS

4

Page 36: Metrics evolution breakfast edition

REALTIME MAPS – PURE MARKETING • HTTP://CYBERMAP.KASPERSKY.COM/ HTTP://HTTP://MAP.IPVIKING.COM/

3

Page 37: Metrics evolution breakfast edition

OTHER RT MAPS • HTTP://WWW.THREATMETRIX.COM/THREATMETRIX-LABS/WEB-FRAUD-MAP/

• HTTP://WWW.FIREEYE.COM/CYBER-MAP/THREAT-MAP.HTML

• HTTP://WWW.DIGITALATTACKMAP.COM/#ANIM=1&COLOR=0&COUNTRY=ALL&TIME=16352&VIEW=MAP

• HTTP://WWW.SICHERHEITSTACHO.EU/

• HTTP://MASTDB3.MCAFEE.COM/VIRUSMAP3.ASP?NAME=VIRUSMAP&B=IE&LEFT=-162.96&BOTTOM=13.2&RIGHT=-

42.96&TOP=73.2&LANG=EN&OVB=2&FT=JPEG&OCM=1&VIEWBY=2&TRACK=4&PERIOD=1&CHOOSEMAP=1&CMD=ZOO

MIN

• HTTP://CERT.EUROPA.EU/BIGSCREENMAP/

2

Page 38: Metrics evolution breakfast edition

THREATBUTT

• CYBER POMPEII

1

Page 39: Metrics evolution breakfast edition

Time is precious, thank you for yours

https://uk.linkedin.com/in/jmck4cybersecurity