STRATEGIES FOR SECURITY: WHEN, WHY, HOW Adam Ely adam@bluebox.com - - PowerPoint PPT Presentation

strategies for security when why how
SMART_READER_LITE
LIVE PREVIEW

STRATEGIES FOR SECURITY: WHEN, WHY, HOW Adam Ely adam@bluebox.com - - PowerPoint PPT Presentation

STRATEGIES FOR SECURITY: WHEN, WHY, HOW Adam Ely adam@bluebox.com www.bluebox.com @BlueboxSec About ME About ME Experience Co-founder Bluebox Security CISO, Heroku CISO, TiVo Walt Disney . Other nifty stuff Coded


slide-1
SLIDE 1

STRATEGIES FOR SECURITY: WHEN, WHY, HOW

Adam Ely adam@bluebox.com www.bluebox.com @BlueboxSec

slide-2
SLIDE 2

About ME About ME

Experience

  • Co-founder Bluebox Security
  • CISO, Heroku
  • CISO, TiVo
  • Walt Disney….

Other nifty stuff

  • Coded exploits
  • Consulted for the government
  • Published numerous articles & papers
  • <insert other egotistical stuff here>
slide-3
SLIDE 3

Define: Security Define: Security

CIA Triad: Use as a basic guiding principle

slide-4
SLIDE 4

Define: Security Define: Security

Security is comprised of many things.

  • Technical bits
  • Application security
  • Infrastructure security
  • Access controls
  • Non-techie bits
  • Process
  • Compliance
  • Legal
  • Assurance
slide-5
SLIDE 5

Define: Security Define: Security

Security is comprised of many things.

  • Technical bits
  • Application security
  • Code standards
  • Sanitization functions
  • Vetted framework versions
  • Application/lib/framework updates
  • Logging
  • Session handling
  • etc….
slide-6
SLIDE 6

Define: Security Define: Security

Security is comprised of many things.

  • Technical bits
  • Infrastructure security
  • Configuration
  • Hardening
  • Patching
  • User & group management
  • Network topology/security groups
  • Logging
  • etc….
slide-7
SLIDE 7

Define: Security Define: Security

Security is minimizing risk to both those that trust us and our organization through the assurance of confidentiality, integrity, and availability. I’m embarrassed to even mention the triad but it works and proves this shit ain’t new.

slide-8
SLIDE 8

Security: Why Security: Why

  • Bullshit answer
  • Compromises always mean loss of business
  • Crappy answer
  • Depends on your business
  • Better Answers
  • Spike Lee said: Do the right thing
  • You have IP that is valuable, don’t get jacked
  • Customers have valuable information
  • Dealing with fines & bad publicity is a PIA
  • Enterprises need assurances
slide-9
SLIDE 9

Security: Why Security: Why

Enterprises need assurances. Why? #1 Reason

  • You haven’t proven yourself as being legit

and on their level. Much like dating. Other

  • Valuable assets = loss of market leadership
  • Monetary penalties = no return on this

“investment”

  • Someone’s ass is on the line = Bob gets fired
slide-10
SLIDE 10

Security: Why Security: Why

But what do I get from security?

  • Customer adoption
  • Market leadership
  • Money ($$$$$)
slide-11
SLIDE 11

Define: How Define: How

  • Make it frictionless and part of how you operate
  • Understand customer concerns
  • Distinguish between needs and wants
  • Understand your risks & concerns
  • Prioritize
  • Big wins first
  • Just like building a product
  • Learn from those before us
  • Define ownership
  • Communicate & be transparent
slide-12
SLIDE 12

Define: How Define: How

Make it frictionless and part of how you operate

  • If it interferes with productivity, people will

ignore it, go around it, and bitch about it.

  • Build security into what you already do
  • Give good options for doing the right (secure)

thing. Example: Have a custom client side tool? Have it perform a client side audit each time it runs. Continuous auditing w/o manual audits

slide-13
SLIDE 13

Define: How Define: How

Understand customer concerns

  • Customers want everything
  • Boil down to what they need
  • Solve for need, work towards want

Example: Customer might want PCI compliance. Not relevant to your business? Show intent and how you meet their data security needs while working to check that box for future clueless customers.

slide-14
SLIDE 14

Define: How Define: How

Understand your risks & concerns

  • You know your risks better than anyone
  • Where do you think you have issues?
  • How would you exploit those weaknesses?
  • How easy would it be for someone else?
  • Define and prioritize
slide-15
SLIDE 15

Define: How Define: How

Prioritize

  • What can you do now that gives the biggest

wins?

  • Security prioritization is just like building a

product

  • Think of a CISO as the product manager of

your security

slide-16
SLIDE 16

Define: How Define: How

Learn from those before us

  • This shit ain’t new
  • Learn from previous breaches
  • You’re smart but this isn’t your wheelhouse
  • RTFM, plenty of resources out there
slide-17
SLIDE 17

Define: How Define: How

Define ownership

  • Executive level champion to influence the
  • rg.
  • Tactical level leaders and involvement to

keep it fresh and moving

slide-18
SLIDE 18

Define: How Define: How

Communicate & be transparent

  • Ease customers minds, communicate
  • Document what you do, say what you don’t
  • Show that you’re always working to be

“better” and meet their ever changing needs

  • Build a transparent relationship
  • Find the right verticals, go after others when

ready

slide-19
SLIDE 19

Define: How Define: How

Where to actually start?

  • Customer data storage and handling
  • Culture of treating security as a first class citizen
  • Customer data storage and handling
  • Application security
  • Infrastructure configuration & patching
  • Access controls
  • Policies/documentation
  • 3rd party audits
slide-20
SLIDE 20

Security: when Security: when

  • Start as early as possible
  • Make it core to the culture
  • The sooner, less to fix later
  • Increase effort as needed to meet customer

needs/demands

  • Roadmap your security strategy like a product
  • Hire dedicated people for security when you

must impress customers, there is no forward momentum, or there is work to justify doing so

  • Prior to that, involve anyone who wants to help
slide-21
SLIDE 21

STRATEGIES FOR SECURITY: WHEN, WHY, HOW

Adam Ely adam@bluebox.com www.bluebox.com @BlueboxSec