SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Smarter Security

Omar Khawaja

@smallersecurity
1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING
THEORETICAL: Universe of bad things that can happen to anyone

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

2
2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS
ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS
ACTUAL: Bad things (color indicates frequency) that actually happened

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

3
3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR
ORGANIZATION BE WORRIED ABOUT?
THEORETICAL FOR YOU: bad things that are likely to happen to your organization
if you have no protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

4
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

5
5. What is the desired state?
IDEAL FOR YOU: bad things that are likely to happen to your organization given you
have sufficient protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

6
What’s under the hood?
VERIS
VERIS is a (open and free) set of metrics designed to provide a common
language for describing security incidents (or threats) in a structured and
repeatable manner.

Actor – Who did it?

Action – How’d they do it?
Asset – What was affected?
Attribute – How was it affected?
http://www.veriscommunity.net
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

8
1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING
THEORETICAL: Universe of bad things that can happen to anyone

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

9
2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY
HAPPENED ACROSS ALL ORGANIZATIONS
ACTUAL: Bad things (color indicates frequency) that actually happened

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

10
3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR
ORGANIZATION BE WORRIED ABOUT?
THEORETICAL FOR YOU: bad things that are likely to happen to your organization if
you have no protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

11
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

12
4. HOW WELL PROTECTED IS YOUR ORGANIZATION?
REALITY FOR YOU: bad things that are likely to happen to your organization given
you have some protection in place (color indicates likelihood)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

13
5. HOW DO YOU GET TO THE DESIRED STATE?

6 SECURITY SOLUTION AREAS:
• Data Protection
• Governance, Risk & Compliance
• Identity & Access Mgmt
• Investigative Response
• Threat Mgmt (MSS)
• Vulnerability Mgmt

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

14
5. HOW DO YOU GET TO THE DESIRED STATE?
SOME SPECIFICS…
DBIR FINDINGS

VERIZON SOLUTIONS

WHY VERIZON?

71%: victim didn’t know how
much data was stolen

Data Discovery (DDISC)

Scanned 100,000,000+ files and
discovered 1,000,000,000+ targeted
data elements

61%: payment card data was stolen

PCI Compliance

More PCI auditors(140+ QSAs) than
any other firm in the world

100%: data was exfilterated

Data Loss Prevention (DLP)

Led one of the largest DLP
deployments
in the world (400,000 seats)

92% of attackers were external

Managed Secure Enterprise
Gateway (MSEG)

7 SOCs on 4 continents manage
security devices in 45 countries

52% of attacks involved Hacking

Vulnerability Scanning Service

Delivered 1500+ vulnerability mgmt
engagements in past 3 years

Universal Identity Services (UIS)

Manage digital identities in 50+
countries
& for 25+ national governments

Security Mgmt Program (SMP)

SMP is the oldest security certification
program in the industry

Rapid Response Retainer (RRR)

Handled 9 of the world’s 11 largest
data compromise investigations

Incident Analytics Service (IAS)

Analyzed 2500+ data breaches
involving more than 1 Billion records

76% of network intrusions exploited
weak or stolen credentials
75% of all attacks were opportunistic
(vs. targeted)
78% of attacks were of Low or Very
Low difficulty
82%: discovered by External party
36%: took weeks or more to contain
78%: took weeks or more to discover

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

15
WHAT DOES SMARTER SECURITY LOOK LIKE?

1. VERIS

STRATEGY BASED ON EVIDENCE
• Not FUD
2. DBIR

DON’T START
W/ PRODUCTS OR TOOLS
• Start with what’s worth protecting

3. IAS (“Custom DBIR”)

4. Security Monitoring

DON’T DEPLOY THE SECURITY
CONTROLS THAT SOUND
COMPELLING
• Deploy the security controls you
really need

DON’T FOCUS ON ALL THE DOTS
• Focus on the right dots
5. Security Enforcement

@smallersecurity
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

16
VERIZON’S SECURITY LEADERSHIP
INDUSTRY RECOGNITION
•
•
•
•

Large & highly rated MSSP (Frost & Sullivan, Gartner, Forrester)
Founding and Executive Member of Open Identity Exchange
Security Consulting practice recognized as a Strong Performer (Forrester)
ICSA Labs is the industry standard for certifying security products (started in 1991)

ISO 9001
ISO 17025

CREDENTIALS
• One of the largest PCI auditors (100+ QSAs) in the world
• Actively participate in 30+ standards / certification bodies, professional
organizations and vertical specific consortia
• Personnel hold 40+ unique industry, technology and vendor certifications

GLOBAL REACH
•
•
•
•

550+ dedicated security consultants in 28 countries speak 28 languages
Investigated breaches in 41 countries in 2011 and 2012
7 SOCs on 4 continents manage security devices in 45+ countries
Serve 77% of Forbes Global 2000

EXPERIENCE
•
•
•
•

Verizon’s SMP is the oldest security certification program in the industry
Analyzed 2500+ breaches involving 1+ Billion records
Manage identities in 50+ countries and for 25+ national governments
Delivered 5000+ security consulting engagements in the past 3 years

@smallersecurity
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

17

Weitere ähnliche Inhalte

Was ist angesagt?

How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditSBWebinars
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee PresentationTony DeGonia (LION)
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 

Was ist angesagt? (20)

How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 

Ähnlich wie Smarter Security - A Practical Guide to Doing More with Less

Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation SampleRichard Smiraldi
 
WE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's ResponsibilityWE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's ResponsibilitySociety of Women Engineers
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Amazon Web Services
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionMichael Klein
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesLiberteks
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...IntelCollab.com
 
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02Laurie Shook, MBA
 
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie ShookBlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie ShookSocialMedia.org
 
The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMDavid Doret
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance Career Communications Group
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Question 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docxQuestion 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docxIRESH3
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 

Ähnlich wie Smarter Security - A Practical Guide to Doing More with Less (20)

Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
 
WE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's ResponsibilityWE16 - Cyber Security - Security is Everyone's Responsibility
WE16 - Cyber Security - Security is Everyone's Responsibility
 
PCI forensic investigations
PCI forensic investigations PCI forensic investigations
PCI forensic investigations
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for Dummies
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your ...
 
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02bw23-nyfinalpresentation-verizon-130426104853-phpapp02
bw23-nyfinalpresentation-verizon-130426104853-phpapp02
 
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie ShookBlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
BlogWell New York Social Media Case Study: Verizon, presented by Laurie Shook
 
The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Question 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docxQuestion 11.  The events that marked Bleeding KansasAnswe.docx
Question 11.  The events that marked Bleeding KansasAnswe.docx
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 

Kürzlich hochgeladen

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Kürzlich hochgeladen (20)

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

Smarter Security - A Practical Guide to Doing More with Less

  • 2. 1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING THEORETICAL: Universe of bad things that can happen to anyone Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2
  • 3. 2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS ACTUAL: Bad things (color indicates frequency) that actually happened Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 3
  • 4. 3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR ORGANIZATION BE WORRIED ABOUT? THEORETICAL FOR YOU: bad things that are likely to happen to your organization if you have no protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 4
  • 5. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
  • 6. 5. What is the desired state? IDEAL FOR YOU: bad things that are likely to happen to your organization given you have sufficient protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 6
  • 8. VERIS VERIS is a (open and free) set of metrics designed to provide a common language for describing security incidents (or threats) in a structured and repeatable manner. Actor – Who did it? Action – How’d they do it? Asset – What was affected? Attribute – How was it affected? http://www.veriscommunity.net Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 8
  • 9. 1. MOST ORGANIZATIONS WORRY ABOUT EVERYTHING THEORETICAL: Universe of bad things that can happen to anyone Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 9
  • 10. 2. IN REALITY, ONLY CERTAIN TYPES OF BAD THINGS ACTUALLY HAPPENED ACROSS ALL ORGANIZATIONS ACTUAL: Bad things (color indicates frequency) that actually happened Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 10
  • 11. 3. SPECIFICALLY, WHICH BAD THINGS SHOULD YOUR ORGANIZATION BE WORRIED ABOUT? THEORETICAL FOR YOU: bad things that are likely to happen to your organization if you have no protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 11
  • 12. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 12
  • 13. 4. HOW WELL PROTECTED IS YOUR ORGANIZATION? REALITY FOR YOU: bad things that are likely to happen to your organization given you have some protection in place (color indicates likelihood) Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 13
  • 14. 5. HOW DO YOU GET TO THE DESIRED STATE? 6 SECURITY SOLUTION AREAS: • Data Protection • Governance, Risk & Compliance • Identity & Access Mgmt • Investigative Response • Threat Mgmt (MSS) • Vulnerability Mgmt Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 14
  • 15. 5. HOW DO YOU GET TO THE DESIRED STATE? SOME SPECIFICS… DBIR FINDINGS VERIZON SOLUTIONS WHY VERIZON? 71%: victim didn’t know how much data was stolen Data Discovery (DDISC) Scanned 100,000,000+ files and discovered 1,000,000,000+ targeted data elements 61%: payment card data was stolen PCI Compliance More PCI auditors(140+ QSAs) than any other firm in the world 100%: data was exfilterated Data Loss Prevention (DLP) Led one of the largest DLP deployments in the world (400,000 seats) 92% of attackers were external Managed Secure Enterprise Gateway (MSEG) 7 SOCs on 4 continents manage security devices in 45 countries 52% of attacks involved Hacking Vulnerability Scanning Service Delivered 1500+ vulnerability mgmt engagements in past 3 years Universal Identity Services (UIS) Manage digital identities in 50+ countries & for 25+ national governments Security Mgmt Program (SMP) SMP is the oldest security certification program in the industry Rapid Response Retainer (RRR) Handled 9 of the world’s 11 largest data compromise investigations Incident Analytics Service (IAS) Analyzed 2500+ data breaches involving more than 1 Billion records 76% of network intrusions exploited weak or stolen credentials 75% of all attacks were opportunistic (vs. targeted) 78% of attacks were of Low or Very Low difficulty 82%: discovered by External party 36%: took weeks or more to contain 78%: took weeks or more to discover Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 15
  • 16. WHAT DOES SMARTER SECURITY LOOK LIKE? 1. VERIS STRATEGY BASED ON EVIDENCE • Not FUD 2. DBIR DON’T START W/ PRODUCTS OR TOOLS • Start with what’s worth protecting 3. IAS (“Custom DBIR”) 4. Security Monitoring DON’T DEPLOY THE SECURITY CONTROLS THAT SOUND COMPELLING • Deploy the security controls you really need DON’T FOCUS ON ALL THE DOTS • Focus on the right dots 5. Security Enforcement @smallersecurity Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 16
  • 17. VERIZON’S SECURITY LEADERSHIP INDUSTRY RECOGNITION • • • • Large & highly rated MSSP (Frost & Sullivan, Gartner, Forrester) Founding and Executive Member of Open Identity Exchange Security Consulting practice recognized as a Strong Performer (Forrester) ICSA Labs is the industry standard for certifying security products (started in 1991) ISO 9001 ISO 17025 CREDENTIALS • One of the largest PCI auditors (100+ QSAs) in the world • Actively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortia • Personnel hold 40+ unique industry, technology and vendor certifications GLOBAL REACH • • • • 550+ dedicated security consultants in 28 countries speak 28 languages Investigated breaches in 41 countries in 2011 and 2012 7 SOCs on 4 continents manage security devices in 45+ countries Serve 77% of Forbes Global 2000 EXPERIENCE • • • • Verizon’s SMP is the oldest security certification program in the industry Analyzed 2500+ breaches involving 1+ Billion records Manage identities in 50+ countries and for 25+ national governments Delivered 5000+ security consulting engagements in the past 3 years @smallersecurity Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 17

Hinweis der Redaktion

  1. For the latest version, please contact Omar KhawajaThe approach that follows intends to help organizations make the transition from thinking of security as a grouping of tools to a truly risk-based (and evidence-based) approach that has been preached for years, but one that continues to elude most organizations.
  2. 1. Most organizations worry about everything: the universe of bad things that can happen to anyone; this is one contributing factor to every security leader complaining about not have enough budget, time, resources, etc. to protect the organization. The problem is this:  they are trying to protect every asset, against every actor trying to expose every vulnerability… they are trying to boil the ocean. In order to address security, the problem needs to be more narrowly defined…
  3. This is in line with our approach to transition MSS from thousands of signatures to a few dozen Indicators of Compromise that are most likely2. In reality, only certain types of bad things actually happened across all organizations. Before worrying about the universe of the theoretical (see #1), organizations should make sure they have addressed the actual bad things that are happening.
  4. 3. Specifically, which bad things should your organization be worried about? Even better than worrying about every bad thing that happened to any organization (see #2), why not identify the specific bad things your organization should be worried about given: the types of data you have, your competitive environment, the geographies within which you operate, the people you may have made angry, etc.
  5. The basic stuff is important; do the basic before the sophisticated4. How well protected is your organization? Undoubtedly, every organization has some protection mechanisms in place. When you account for the protection offered by those, will have further reduced their risk (residual risk). Now, the organization knows exactly which areas require additional attention vs. which are sufficiently being addressed.
  6. 5. This is what nirvana looks like. We can’t remove the threats to our business (the dots will always be there), but we can ensure we are sufficiently protected to defend against them (the dots are green vs red or yellow). Address the red dots and yellow dots to turn them into green dots, by deploying (implementing and managing) the relevant security technologies, processes and training. Don’t apply any effort (resources, budget, thinking, sleepless nights, etc.) on white space or green dots prior to addressing the red and yellow dots.
  7. Is this real? How does this actually work?
  8. Confidentiality = data breachesAvailability = DoS Defense
  9. Threat library to monitor for key threats
  10. In reality, some risks will cost too much to mitigate / transfer; in these cases the best option will be to accept the risk (will stay red or yellow in perpetuity)Screenshot from Security Mgmt ProgramThreat library to monitor for key threatsSecurity Monitoring includes control validation too; Gracie = OG + RCMC = MSS + GRC
  11. 5. Address the red dots and yellow dots to turn them into green dots, by deploying (implementing and managing) the relevant security technologies, processes and training. Solve the problems you actually should be worried about vs. the ones that the vendor happens to have a robust solution for.
  12. Don’t need to be a CSO to get itUnderstood by the businessPoints products vs. Solutions Threat ProfilingChange SMP to … Security Monitoring + Ongoing Control Validation + Analytics = Vulns + Threats + AssetsOur security portfolio helps organization turn reds to yellows and yellows to greensNeed vs. Want
  13. For the latest version, please contact Omar KhawajaCREST approved penetration testerActively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortia