slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Conventional Defenses + Unconventional Adversaries ??? PowerPoint Presentation
Download Presentation
Conventional Defenses + Unconventional Adversaries ???

Loading in 2 Seconds...

play fullscreen
1 / 49

Conventional Defenses + Unconventional Adversaries ??? - PowerPoint PPT Presentation


  • 68 Views
  • Uploaded on

Conventional Defenses + Unconventional Adversaries ???. Joshua Corman Director of Security Intelligence Akamai Technologies @ joshcorman. Joshua Corman. Director of Security Intelligence Akamai Technologies @ joshcorman. About Joshua Corman.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Conventional Defenses + Unconventional Adversaries ???' - gasha


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
conventional defenses unconventional adversaries

Conventional Defenses+Unconventional Adversaries???

Joshua Corman

Director of Security Intelligence

Akamai Technologies

@joshcorman

joshua corman

Joshua Corman

Director of Security Intelligence

Akamai Technologies

@joshcorman

about joshua corman
About Joshua Corman
  • Director of Security Intelligence for Akamai Technologies
    • Former Research Director, Enterprise Security [The 451 Group]
    • Former Principal Security Strategist [IBM ISS]
  • Industry Experience:
    • Expert Faculty: The Institute for Applied Network Security (IANS)
    • 2009 NetworkWorldTop 10 Tech People to Know
    • Co-Founder of “Rugged Software” www.ruggedsoftware.org
  • Things I’ve been researching:
    • Compliance vs Security
    • Disruptive Security for Disruptive Innovations
    • Chaotic Actors
    • Espionage
    • Security Metrics
relative risk
Relative Risk

Replaceability

IrreplaceableHighly Replaceable

Human Life Intellectual PropertyPHI Credit Cards

key points from 2011 vz dbir
Key Points from 2011 VZ DBIR
  • All-Time High # of Incidents
  • All-Time Low # of Breached Records
  • Higher Value Records
  • All but one thing got worse
  • MOST cases SMB
slide9

2010 Unholy Trinity:

    • Google.cn and Operation Aurora
    • Stuxnet
    • Bradley Manning/WikiLeaks (and Operation Payback)
  • 2011:
    • Anonymous
    • EMC/RSA SecurID
    • Sony’s Punishment Campaign
    • LulzSec
    • Lockheed
    • IMF
slide11

20 Slides

x 20 Seconds

(6 min 40 sec)

Joshua Corman

@joshcorman

Research Director

Enterprise Security

RSA 2011

PechaKuchaHappy Hour

slide12

Why Zombies Love PCI:

or “No Zombie Left Behind Act”

SPEAKER:

Joshua Corman

Research Director

Enterprise Security

The 451 Group

PechaKucha Happy Hour

is pci the no child left behind act for information security
Is PCI The No Child Left Behind Act for Information Security?
  • Early Adopters
  • Mainstream
  • Laggards
disruptive changes
Disruptive Changes

Evolving

Threat

Evolving

Compliance

Evolving

Technology

Cost

Complexity

Risk

Evolving

Economics

Evolving

Business

we broke the information security market
We broke the Information Security Market

Evolving

Threat

HIPAA

HITECH

SOX

GLB

Evolving

Compliance

Evolving

Technology

Cost

Complexity

Risk

Evolving

Economics

Evolving

Business

slide25

94%

89%

0%

slide27

Survival Guide/Pyramid

www.ruggedsoftware.org

Defensible Infrastructure

slide28

Survival Guide/Pyramid

Operational Discipline

Defensible Infrastructure

slide29

Survival Guide/Pyramid

Situational Awareness

Operational Discipline

Defensible Infrastructure

survival guide pyramid
Survival Guide/Pyramid

Countermeasures

Situational Awareness

Operational Discipline

Defensible Infrastructure

moore s law
Moore’s Law
  • Moore’s Law:
  • Compute power doubles every 18 months
  • HDMoore’sLaw:
  • Casual Attacker Strength grows at the rate of MetaSploit
slide44

Does it matter?

Was #18 in overall DBIR

Top Threat Action Types used to steal INTELLECTUAL PROPERTY AND CLASSIFIED INFORMATION by number of breaches - (excludes breaches only involving payment card data, bank account information, personal information, etc)

case study zombie killer of the week
Case Study: Zombie Killer of the Week?
  • Early Adopters
  • Mainstream
  • Laggards

You

Are

Here

case study zombie killer
Case Study: Zombie Killer

Countermeasures

  • LanCope
  • BigFix (IBM)
  • NetWitness (RSA)
  • Fidelis XPS
  • HBGary
  • FireEye
  • ArcSight (HP)

Situational Awareness

Operational Discipline

Defensible Infrastructure

A real use case of 'better security' in the face of adaptive adversarieshttp://www.the451group.com/report_view/report_view.php?entity_id=66991

slide48

Which classes of adversaries are we likely to face?

  • Which assets are most at risk as a consequence?
  • How tall do we need to be?
  • Table Top Exercises
  • An ounce of prevention?
  • Recovery may not be technical…
  • Failing Well
slide49

Q&A

Joshua Corman

Director of Security Intelligence, Akamai Technologies

@joshcorman

@RuggedSoftware

jcorman@akamai.com