SlideShare ist ein Scribd-Unternehmen logo
1 von 41
1

                  Moneysec - Moneyball
                for Information Security




Phil Agcaoili
Wednesday March 13, 2013
2


Agenda
1st: Moneyball Overview
2nd: Introduction to Moneysec
3rd: Evidence-based Data for Moneysec
Home Run: What can you do with this?




Moneysec               Jared Pfost               Brian Keefer
                       Chief Executive Officer   Security Architect
ideas borrowed from:   Third Defense             Leading SaaS Security Company
3




                      Moneyball

• Reshaping a laggard team into a world-class winner–
  with one of the lowest budgets
• “Willingness to re-think baseball: how it is managed,
  how it is played, who is best suited to play it, and
  why. “– Michael Lewis, author
  – Which statistics are most correlated to winning games
  – Focus on these success metrics and actually use them for
    recruiting, player development, and game-time decisions.
  – Full management commitment
4




                           Correlation
            The degree that two measurements or variables
                  show a tendency to vary together


             negative      Car Fuel Efficiency
                                                      zero                                 positive




                                                                  # of Car Accidents
Car Value




             Car Mileage                         Car Body Color                        Car Insurance Cost
5


   The Moneyball Formula
                             (hits + walks) x total bases
  runs created =
                                  (at bats + walks)
Bill James’ formula:
“…it implied, specifically, that (professional baseball people) didn’t place enough
   value on walks and extra base hits . . . And placed too much value on batting
   average and stolen bases.”
“…The details of James’s equation didn’t matter all that much…What mattered
  was (a) it was a rational, testable hypothesis; and (b) James made it so clear
  and interesting that it provoked a lot of intelligent people to join the
  conversation.” p. 78

       Metric: On-base Percentage instead of Batting Average
                                                     Source: Michael Lewis - Moneyball
6



Offensive strategy

                     Defensive strategy




                          Source: Michael Richmond
7


Moneyball Formula in Action
                 (hits + walks) x total bases
runs created =
                   (at bats + walks)
 2011


                 (1,556 + 571) x 2,360
runs created =                           = 794
                    (5,635 + 571)
                                       787 actual
8
                                                Total Actual Predicted          %
Team - 2011             At Bats   Hits    Walks Bases Runs     Runs Variance Variance
Texas Rangers            5,635    1,556    511   2,360   787      794        (7)   -1%
Kansas City Royals       5,604    1,534    471   2,238   676      739       (63)   -8%
Minnesota Twins          5,568    1,521    559   2,347   781      797       (16)   -2%
Cincinnati Reds          5,579    1,515    522   2,432   790      812       (22)   -3%
Detroit Tigers           5,643    1,515    546   2,343   751      780       (29)   -4%
Boston Red Sox           5,646    1,511    587   2,546   818      857       (39)   -5%
Chicago White Sox        5,484    1,467    467   2,303   752      748         4     0%
New York Yankees         5,567    1,485    662   2,427   859      837        22     3%
St. Louis Cardinals      5,542    1,456    541   2,227   736      731         5     1%
Colorado Rockies         5,530    1,452    585   2,349   770      782       (12)   -2%
Milwaukee Brewers        5,606    1,471    546   2,376   750      779       (29)   -4%
Philadelphia Phillies    5,581    1,451    560   2,307   772      755        17     2%
Baltimore Orioles        5,554    1,440    424   2,145   613      669       (56)   -8%
Atlanta Braves           5,463    1,411    634   2,190   738      735         3     0%
San Francisco Giants     5,488    1,411    487   2,241   697      712       (15)   -2%
Chicago Cubs             5,512    1,414    479   2,213   685      699       (14)   -2%
Oakland Athletics        5,448    1,396    527   2,059   663      663         0     0%
Florida Marlins          5,531    1,403    514   2,227   719      706        13     2%
Los Angeles Dodgers      5,426    1,368    533   2,056   667      656        11     2%
Washington Nationals     5,418    1,355    503   2,114   655      663        (8)   -1%
Arizona Diamondbacks     5,473    1,366    589   2,275   713      734       (21)   -3%
New York Mets            5,465    1,361    502   2,091   656      653         3     0%
Los Angeles Angels       5,488    1,363    466   2,142   681      658        23     3%
Toronto Blue Jays        5,495    1,364    471   2,496   755      768       (13)   -2%
Cleveland Indians        5,487    1,362    545   2,076   646      656       (10)   -2%
Houston Astros           5,452    1,348    415   1,974   611      593        18     3%
Tampa Bay Rays           5,439    1,343    672   2,192   802      723        79    11%
San Diego Padres         5,434    1,338    538   2,018   665      634        31     5%
Pittsburgh Pirates       5,386    1,303    463   2,011   587      607       (20)   -3%
Seattle Mariners         5,409    1,274    459   1,836   513      542       (29)   -5%
                                                               Average Variance    -1%
9


                   Oakland A’s
•   Teams bid for players in Free Agent market
•   Start of 2002 A’s had payroll ~$40M*
•   NY Yankees payroll ~$126M*
•   So poor teams have no shot at winning, right?
                                                             *From “Moneyball”

                       1999-2001
       Team         Wins         Losses      Est Payroll**

       NYY          280            203           $257M

       OAK          280            205           $70M

        **Estimate from baseball-reference.com
10




                       Billy Beane
•   GM Billy Beane defied convention
    –   He didn’t follow “best practices”
    –   He made data-drive decisions
    –   Hired Paul DePodesta

“The evaluation of young baseball players had been taken out
   of the hands of old baseball men and placed in the hands
   of people who had what Billy valued most . . . a degree in
   something other than baseball.” p. 41

“What you don’t do is what the Yankees do. If we do . . . We
   lose every time, because they’re doing it with 3 times more
   money than we are . . . The poor team was forced to find
   bargains: young players and whatever older guys the
   market had undervalued.” p. 119
11




         Traditional Baseball


•   Talent is evaluated by scouts
•   Scouts are usually washed-up players
•   i.e. “Industry veterans” or “experts”
•   Value statements are largely subjective
12




  A few word about scouts…




Should we say
outdated?
13




            Next-gen Baseball


•   Started in 1977
•   Bill James wanted to see what influenced
    game outcome
    –   Realized stats created in 1859 didn’t properly
        attribute events
14




                  Key lessons

•   Don’t make emotional decisions
    –   Recognize your bias
•   Collect the “right” data
    –   Look for correlations
•   Set reasonable criteria for success
    –   Don’t overspend
15




              Moneyball Metrics

• Not all measures are equally important (80/20)
• Watch out for “analysis paralysis”.
• What are the most meaningful measures?
• Less is more. Allows focus.
• What processes are intuitively managed that could
  be better run based on statistical facts?
• How would this affect your culture and how you hire,
  develop, promote, and field a security team based
  on these insights?
16



        Moneyball Metrics
• Key to the value of Moneyball Metrics
  True potential = not just measure, but also:
  – Track and trend performance over time
  – Benchmark performance vs. self (and peers)
  – Identify strengths and weaknesses
  – Diagnose - understand the interrelationships and
    underlying drivers of performance
  – Prescribe actions to improve performance
  – Establish performance goals for both individuals
    and overall security team
  – Become “World-Class”
  All metrics are worthless – unless you do
    something with them.
17


           What can we learn from
                Moneyball?

“Why didn’t anybody do this before?”




                                    Moneysec
                       A practical approach to
                         security investments
18



Throw Money at the Security Problem?
Problem Statement



• Every organization is competing with
attackers
• Most don’t have Fortune 50 budget
• How can you be effective?
20




        Conventional “Wisdom”


•   “Everyone knows” that you need
    –   Firewall
    –   Anti-virus
    –   Change passwords frequently
    –   Prohibit social networking
    –   Etc.
21




             Do they work?


•   Port 80 goes through the firewall
•   Anti-virus misses custom malware
•   Stolen passwords used quickly
•   Social networking key to marketing and
    employee satisfaction
22




     Clearly this is not working
•   Do we actually want a new strategy?
•   What does winning look like?
•   How do we get started?
    • Applying new model
    • Use the security stats that are out there
       –   Verizon Data Breach Investigations Report
       –   Trustwave Global Security Report
       –   Ponemon Institute Cost of Data Breach Report and Research Studies
       –   Manidant M-Trends Report
       –   Symantec reports
       –   CSO Magazine Global State of Information Security Survey
       –   Metricon
23




Models for Research and Investment
       theory development                  theory


          interpretation                 hypothesis


              data                    hypothesis testing


 • Inductive                       • Deductive
    – starts with data available      – starts with theoretical
    – concludes with possible           framework
      hypotheses                      – concludes with logical
    – bottom up data driven             deductions
      approach                        – theory driven approach
24


     Trends
                                         Motivating
                                          Event
Fix what’s broken
• Hacks and compromise
   – Fix what’s already been hacked at your company
• Understand security trends for your industry
   – Small and Medium Business beware
   – Banks – DDOS, fraud, botnets, and web authentication attacks
   – Hospitality – Credit cards, point of sale systems, Wifi, and admin
     accounts
   – DIB – RSA hack, Adobe/Microsoft 0days, remote access, and phishing
   – News – NYT/WSJ, phishing, Oracle Java 0days
   – Retail – Open Wifi, POS
   – LEA – 0day, social engineering and phishing
   – Credit card processors – Phishing and egress traffic
   – Websites – Sony (SQL Injection) and exclusion from core security
• Evaluate your threat landscape to prioritize your treatment
  strategy
25

    2012 Verizon Data Breach Investigations Report (DBIR)




• 5th year of public releases
   – Starting in 2008
   – 7 total reports (mid-year
     supplementals in 2008 and
     2009)
• Dataset now contains:
   – 8 years of data
26

2012 Verizon Data Breach Investigations Report (DBIR)




             2012 Trustwave Global Security Report
                                In those cases in which an external entity was
                                necessary for detection, analysis found that attackers
                                had an average of 173.5 days within the victim’s
                                environment before detection occurred.
                                Conversely, organizations that relied on self-detection
                                were able to identify attackers within their systems an
                                average of 43 days after initial compromise.
27


2012 Verizon Data Breach Investigations Report (DBIR)
28


2011 Verizon Data Breach Investigations Report (DBIR)
29

  2011 Verizon Data Breach Investigations Report (DBIR)


• Eastern Europe takes a
  commanding lead




            Who are the (external) bad guys?
30

 2011 Verizon Data Breach Investigations Report (DBIR)


• Quite a jump in regular
  users (was 51% last year)
• % of breaches involving
  Finance staff doubled
• % of breaches involving
  executives increased from
  7% to 11%



         Who are the (internal) bad guys?
31

2011 Verizon Data Breach Investigations Report (DBIR)




       Customized Malware
32

2011 Verizon Data Breach Investigations Report (DBIR)




            Hacking Methodologies
33

    2011 Verizon Data Breach Investigations Report (DBIR)


•   11% of breaches employed some level of social engineering (down from 28% last year)




             Social Engineering and Physical Security Trends
34


2011 VZ Data Breach Investigations Report and Moneysec




       Device Patch & Config     Monitoring
VZ DBIR and Trustwave GSR




                                             2012 Verizon DBIR



2012 Trustwave GSR
36



            Confidential Documents at Risk Study
Key Findings
• The negligent insider seems to pose the greatest risk because of poor
   internal controls and improper accessing and transferring confidential
   documents.
• Sensitive documents are most at risk at the document and file level.
• Governance tasks or procedures for privilege and access to sensitive
   documents need improvement.
• Budget and compliance monitoring procedures are the critical success
   factors to achieving good internal controls and governance procedures.
37




               Information Leakage
• Ex-employees, partners, and customers
• Over 1/3 due to negligence
• Increasing loss from external collaboration
Percentage cause of data breach
                                    Estimated sources of data breach




                                                   2010 CSO
    Cost of Data Breach report    Global State of Information Security Survey
     Ponemon Institute 2010
38


             Evidence-based Investments
• Don’t protect everything
   – Protect most important data and services
• Small, targeted investments
   – Pass the Red Face Test – Reduce Investments through integration
        • Antivirus - Forefront
        • Full Disk Encryption – Bitlocker
   –   Patch and harden configs
   –   Change default credentials and restrict/monitor privileged accounts
   –   Increase focus on closing the detection and response gap
   –   Secure development through application testing and code reviews
   –   Increase awareness and change culture
        • Social engineering and phishing
        • Destroy what you don’t need
• Treat all endpoints as hostile
• Collapse to cores
   – Protect cores really, really well
• Collect your own metrics and apply security as necessary
39
                      Moneysec Metrics
•   You can measure anything! Even intangibles.
•   You don’t always need to be exact.
•   Reducing uncertainty adds value.
•   Having just some data can go a long way to help a decision maker.

                                                      Source: Douglas Hubbard

• Use industry data
     – You’re not a beautiful snowflake
     – Apply what correlates
• Moneysec metrics
     –   Measure what’s easy
     –   Set targets
     –   Justify as needed
     –   Optimize Cost vs. Target
• More metrics:
     – Moneysec Evolved
     – Metricon
40


                       Conclusion
Quick attempt to grossly oversimplify the theme:
•Billy Beane developed new metrics to win for less.
•Use industry security performance data to help prioritize
spending to win for less.
•Internal information security metrics can be applied along with
industry security performance data.
•Measure well. Gather evidence.
•Determine if you need more or less.
•Apply inductive and deductive approaches to make better
investments.
•Use the evidence you have for better investments.
41



                 Questions & Answers
Phil Agcaoili
Co-Founder & Board Member, Southern CISO Security Council
Distinguished Fellow and Fellows Chairman, Ponemon Institute
Co-Chair, Communication Sector Coordinating Council (CSCC),
                      Cybersecurity Committee – Technology Sub-Committee
Founding Member, Cloud Security Alliance (CSA)
Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack,
                      Security, Trust and Assurance Registry (STAR), and
                      Open Certification Framework (OCF)



            @hacksec
            https://www.linkedin.com/in/philA

Weitere ähnliche Inhalte

Andere mochten auch

Moneyball & Data Analytics
Moneyball & Data AnalyticsMoneyball & Data Analytics
Moneyball & Data AnalyticsHRBoss
 
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value Kerr - The Sudoku of HR Nine Numbers To Prove Your Value
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value HR Florida State Council, Inc.
 
The Moneyball Effect
The Moneyball EffectThe Moneyball Effect
The Moneyball EffectTyler Maher
 
Soccer Fitness: A Science Based Approach
Soccer Fitness: A Science Based ApproachSoccer Fitness: A Science Based Approach
Soccer Fitness: A Science Based ApproachMike Young
 
The In-Season Microcycle 'Physical themes dervied from tactical periodisation'
The In-Season Microcycle  'Physical themes dervied from tactical periodisation'The In-Season Microcycle  'Physical themes dervied from tactical periodisation'
The In-Season Microcycle 'Physical themes dervied from tactical periodisation'Hamish Munro
 
The Moneyball Approach to Recruitment: Big Data = Big Changes
The Moneyball Approach to Recruitment: Big Data = Big ChangesThe Moneyball Approach to Recruitment: Big Data = Big Changes
The Moneyball Approach to Recruitment: Big Data = Big ChangesGlen Cathey
 

Andere mochten auch (7)

Moneyball
MoneyballMoneyball
Moneyball
 
Moneyball & Data Analytics
Moneyball & Data AnalyticsMoneyball & Data Analytics
Moneyball & Data Analytics
 
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value Kerr - The Sudoku of HR Nine Numbers To Prove Your Value
Kerr - The Sudoku of HR Nine Numbers To Prove Your Value
 
The Moneyball Effect
The Moneyball EffectThe Moneyball Effect
The Moneyball Effect
 
Soccer Fitness: A Science Based Approach
Soccer Fitness: A Science Based ApproachSoccer Fitness: A Science Based Approach
Soccer Fitness: A Science Based Approach
 
The In-Season Microcycle 'Physical themes dervied from tactical periodisation'
The In-Season Microcycle  'Physical themes dervied from tactical periodisation'The In-Season Microcycle  'Physical themes dervied from tactical periodisation'
The In-Season Microcycle 'Physical themes dervied from tactical periodisation'
 
The Moneyball Approach to Recruitment: Big Data = Big Changes
The Moneyball Approach to Recruitment: Big Data = Big ChangesThe Moneyball Approach to Recruitment: Big Data = Big Changes
The Moneyball Approach to Recruitment: Big Data = Big Changes
 

Ähnlich wie Moneysec - Moneyball for Security

DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012Epic Research Limited
 
Union Gaming Analytics (Michael Greene)
Union Gaming Analytics (Michael Greene)Union Gaming Analytics (Michael Greene)
Union Gaming Analytics (Michael Greene)krgc
 
Leg sun lottery review board rebutal-final final
Leg sun   lottery review board rebutal-final finalLeg sun   lottery review board rebutal-final final
Leg sun lottery review board rebutal-final finalkrgc
 
Introducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsIntroducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsJames Gwertzman
 
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports Analytics
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports AnalyticsLoras College 2014 Business Analytics Symposium | Dan Conway: Sports Analytics
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports AnalyticsCartegraph
 
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...Sean McCluskey
 
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012Epic Research Limited
 
Dr. Jeffrey L. Derevensky
Dr. Jeffrey L. Derevensky Dr. Jeffrey L. Derevensky
Dr. Jeffrey L. Derevensky Horizons RG
 
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012Epic Research Limited
 
Week 3 Intro to Gamification
Week 3 Intro to GamificationWeek 3 Intro to Gamification
Week 3 Intro to Gamificationcenter4edupunx
 

Ähnlich wie Moneysec - Moneyball for Security (11)

Cap Preso
Cap PresoCap Preso
Cap Preso
 
DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-27 APRIL 2012
 
Union Gaming Analytics (Michael Greene)
Union Gaming Analytics (Michael Greene)Union Gaming Analytics (Michael Greene)
Union Gaming Analytics (Michael Greene)
 
Leg sun lottery review board rebutal-final final
Leg sun   lottery review board rebutal-final finalLeg sun   lottery review board rebutal-final final
Leg sun lottery review board rebutal-final final
 
Introducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsIntroducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOps
 
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports Analytics
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports AnalyticsLoras College 2014 Business Analytics Symposium | Dan Conway: Sports Analytics
Loras College 2014 Business Analytics Symposium | Dan Conway: Sports Analytics
 
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...
Who are the 3 Most Valuable Pitchers in MLB? A Pitcher Projection and Valuati...
 
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012
DAILY-EQUITY-REPORT BY EPIC RESEARCH-23 MARCH 2012
 
Dr. Jeffrey L. Derevensky
Dr. Jeffrey L. Derevensky Dr. Jeffrey L. Derevensky
Dr. Jeffrey L. Derevensky
 
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012
DAILY EQUTY REPORT BY EPIC RESEARCH-10 MAY 2012
 
Week 3 Intro to Gamification
Week 3 Intro to GamificationWeek 3 Intro to Gamification
Week 3 Intro to Gamification
 

Mehr von Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
 

Mehr von Phil Agcaoili (20)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Moneysec - Moneyball for Security

  • 1. 1 Moneysec - Moneyball for Information Security Phil Agcaoili Wednesday March 13, 2013
  • 2. 2 Agenda 1st: Moneyball Overview 2nd: Introduction to Moneysec 3rd: Evidence-based Data for Moneysec Home Run: What can you do with this? Moneysec Jared Pfost Brian Keefer Chief Executive Officer Security Architect ideas borrowed from: Third Defense Leading SaaS Security Company
  • 3. 3 Moneyball • Reshaping a laggard team into a world-class winner– with one of the lowest budgets • “Willingness to re-think baseball: how it is managed, how it is played, who is best suited to play it, and why. “– Michael Lewis, author – Which statistics are most correlated to winning games – Focus on these success metrics and actually use them for recruiting, player development, and game-time decisions. – Full management commitment
  • 4. 4 Correlation The degree that two measurements or variables show a tendency to vary together negative Car Fuel Efficiency zero positive # of Car Accidents Car Value Car Mileage Car Body Color Car Insurance Cost
  • 5. 5 The Moneyball Formula (hits + walks) x total bases runs created = (at bats + walks) Bill James’ formula: “…it implied, specifically, that (professional baseball people) didn’t place enough value on walks and extra base hits . . . And placed too much value on batting average and stolen bases.” “…The details of James’s equation didn’t matter all that much…What mattered was (a) it was a rational, testable hypothesis; and (b) James made it so clear and interesting that it provoked a lot of intelligent people to join the conversation.” p. 78 Metric: On-base Percentage instead of Batting Average Source: Michael Lewis - Moneyball
  • 6. 6 Offensive strategy Defensive strategy Source: Michael Richmond
  • 7. 7 Moneyball Formula in Action (hits + walks) x total bases runs created = (at bats + walks) 2011 (1,556 + 571) x 2,360 runs created = = 794 (5,635 + 571) 787 actual
  • 8. 8 Total Actual Predicted % Team - 2011 At Bats Hits Walks Bases Runs Runs Variance Variance Texas Rangers 5,635 1,556 511 2,360 787 794 (7) -1% Kansas City Royals 5,604 1,534 471 2,238 676 739 (63) -8% Minnesota Twins 5,568 1,521 559 2,347 781 797 (16) -2% Cincinnati Reds 5,579 1,515 522 2,432 790 812 (22) -3% Detroit Tigers 5,643 1,515 546 2,343 751 780 (29) -4% Boston Red Sox 5,646 1,511 587 2,546 818 857 (39) -5% Chicago White Sox 5,484 1,467 467 2,303 752 748 4 0% New York Yankees 5,567 1,485 662 2,427 859 837 22 3% St. Louis Cardinals 5,542 1,456 541 2,227 736 731 5 1% Colorado Rockies 5,530 1,452 585 2,349 770 782 (12) -2% Milwaukee Brewers 5,606 1,471 546 2,376 750 779 (29) -4% Philadelphia Phillies 5,581 1,451 560 2,307 772 755 17 2% Baltimore Orioles 5,554 1,440 424 2,145 613 669 (56) -8% Atlanta Braves 5,463 1,411 634 2,190 738 735 3 0% San Francisco Giants 5,488 1,411 487 2,241 697 712 (15) -2% Chicago Cubs 5,512 1,414 479 2,213 685 699 (14) -2% Oakland Athletics 5,448 1,396 527 2,059 663 663 0 0% Florida Marlins 5,531 1,403 514 2,227 719 706 13 2% Los Angeles Dodgers 5,426 1,368 533 2,056 667 656 11 2% Washington Nationals 5,418 1,355 503 2,114 655 663 (8) -1% Arizona Diamondbacks 5,473 1,366 589 2,275 713 734 (21) -3% New York Mets 5,465 1,361 502 2,091 656 653 3 0% Los Angeles Angels 5,488 1,363 466 2,142 681 658 23 3% Toronto Blue Jays 5,495 1,364 471 2,496 755 768 (13) -2% Cleveland Indians 5,487 1,362 545 2,076 646 656 (10) -2% Houston Astros 5,452 1,348 415 1,974 611 593 18 3% Tampa Bay Rays 5,439 1,343 672 2,192 802 723 79 11% San Diego Padres 5,434 1,338 538 2,018 665 634 31 5% Pittsburgh Pirates 5,386 1,303 463 2,011 587 607 (20) -3% Seattle Mariners 5,409 1,274 459 1,836 513 542 (29) -5% Average Variance -1%
  • 9. 9 Oakland A’s • Teams bid for players in Free Agent market • Start of 2002 A’s had payroll ~$40M* • NY Yankees payroll ~$126M* • So poor teams have no shot at winning, right? *From “Moneyball” 1999-2001 Team Wins Losses Est Payroll** NYY 280 203 $257M OAK 280 205 $70M **Estimate from baseball-reference.com
  • 10. 10 Billy Beane • GM Billy Beane defied convention – He didn’t follow “best practices” – He made data-drive decisions – Hired Paul DePodesta “The evaluation of young baseball players had been taken out of the hands of old baseball men and placed in the hands of people who had what Billy valued most . . . a degree in something other than baseball.” p. 41 “What you don’t do is what the Yankees do. If we do . . . We lose every time, because they’re doing it with 3 times more money than we are . . . The poor team was forced to find bargains: young players and whatever older guys the market had undervalued.” p. 119
  • 11. 11 Traditional Baseball • Talent is evaluated by scouts • Scouts are usually washed-up players • i.e. “Industry veterans” or “experts” • Value statements are largely subjective
  • 12. 12 A few word about scouts… Should we say outdated?
  • 13. 13 Next-gen Baseball • Started in 1977 • Bill James wanted to see what influenced game outcome – Realized stats created in 1859 didn’t properly attribute events
  • 14. 14 Key lessons • Don’t make emotional decisions – Recognize your bias • Collect the “right” data – Look for correlations • Set reasonable criteria for success – Don’t overspend
  • 15. 15 Moneyball Metrics • Not all measures are equally important (80/20) • Watch out for “analysis paralysis”. • What are the most meaningful measures? • Less is more. Allows focus. • What processes are intuitively managed that could be better run based on statistical facts? • How would this affect your culture and how you hire, develop, promote, and field a security team based on these insights?
  • 16. 16 Moneyball Metrics • Key to the value of Moneyball Metrics True potential = not just measure, but also: – Track and trend performance over time – Benchmark performance vs. self (and peers) – Identify strengths and weaknesses – Diagnose - understand the interrelationships and underlying drivers of performance – Prescribe actions to improve performance – Establish performance goals for both individuals and overall security team – Become “World-Class” All metrics are worthless – unless you do something with them.
  • 17. 17 What can we learn from Moneyball? “Why didn’t anybody do this before?” Moneysec A practical approach to security investments
  • 18. 18 Throw Money at the Security Problem?
  • 19. Problem Statement • Every organization is competing with attackers • Most don’t have Fortune 50 budget • How can you be effective?
  • 20. 20 Conventional “Wisdom” • “Everyone knows” that you need – Firewall – Anti-virus – Change passwords frequently – Prohibit social networking – Etc.
  • 21. 21 Do they work? • Port 80 goes through the firewall • Anti-virus misses custom malware • Stolen passwords used quickly • Social networking key to marketing and employee satisfaction
  • 22. 22 Clearly this is not working • Do we actually want a new strategy? • What does winning look like? • How do we get started? • Applying new model • Use the security stats that are out there – Verizon Data Breach Investigations Report – Trustwave Global Security Report – Ponemon Institute Cost of Data Breach Report and Research Studies – Manidant M-Trends Report – Symantec reports – CSO Magazine Global State of Information Security Survey – Metricon
  • 23. 23 Models for Research and Investment theory development theory interpretation hypothesis data hypothesis testing • Inductive • Deductive – starts with data available – starts with theoretical – concludes with possible framework hypotheses – concludes with logical – bottom up data driven deductions approach – theory driven approach
  • 24. 24 Trends Motivating Event Fix what’s broken • Hacks and compromise – Fix what’s already been hacked at your company • Understand security trends for your industry – Small and Medium Business beware – Banks – DDOS, fraud, botnets, and web authentication attacks – Hospitality – Credit cards, point of sale systems, Wifi, and admin accounts – DIB – RSA hack, Adobe/Microsoft 0days, remote access, and phishing – News – NYT/WSJ, phishing, Oracle Java 0days – Retail – Open Wifi, POS – LEA – 0day, social engineering and phishing – Credit card processors – Phishing and egress traffic – Websites – Sony (SQL Injection) and exclusion from core security • Evaluate your threat landscape to prioritize your treatment strategy
  • 25. 25 2012 Verizon Data Breach Investigations Report (DBIR) • 5th year of public releases – Starting in 2008 – 7 total reports (mid-year supplementals in 2008 and 2009) • Dataset now contains: – 8 years of data
  • 26. 26 2012 Verizon Data Breach Investigations Report (DBIR) 2012 Trustwave Global Security Report In those cases in which an external entity was necessary for detection, analysis found that attackers had an average of 173.5 days within the victim’s environment before detection occurred. Conversely, organizations that relied on self-detection were able to identify attackers within their systems an average of 43 days after initial compromise.
  • 27. 27 2012 Verizon Data Breach Investigations Report (DBIR)
  • 28. 28 2011 Verizon Data Breach Investigations Report (DBIR)
  • 29. 29 2011 Verizon Data Breach Investigations Report (DBIR) • Eastern Europe takes a commanding lead Who are the (external) bad guys?
  • 30. 30 2011 Verizon Data Breach Investigations Report (DBIR) • Quite a jump in regular users (was 51% last year) • % of breaches involving Finance staff doubled • % of breaches involving executives increased from 7% to 11% Who are the (internal) bad guys?
  • 31. 31 2011 Verizon Data Breach Investigations Report (DBIR) Customized Malware
  • 32. 32 2011 Verizon Data Breach Investigations Report (DBIR) Hacking Methodologies
  • 33. 33 2011 Verizon Data Breach Investigations Report (DBIR) • 11% of breaches employed some level of social engineering (down from 28% last year) Social Engineering and Physical Security Trends
  • 34. 34 2011 VZ Data Breach Investigations Report and Moneysec Device Patch & Config Monitoring
  • 35. VZ DBIR and Trustwave GSR 2012 Verizon DBIR 2012 Trustwave GSR
  • 36. 36 Confidential Documents at Risk Study Key Findings • The negligent insider seems to pose the greatest risk because of poor internal controls and improper accessing and transferring confidential documents. • Sensitive documents are most at risk at the document and file level. • Governance tasks or procedures for privilege and access to sensitive documents need improvement. • Budget and compliance monitoring procedures are the critical success factors to achieving good internal controls and governance procedures.
  • 37. 37 Information Leakage • Ex-employees, partners, and customers • Over 1/3 due to negligence • Increasing loss from external collaboration Percentage cause of data breach Estimated sources of data breach 2010 CSO Cost of Data Breach report Global State of Information Security Survey Ponemon Institute 2010
  • 38. 38 Evidence-based Investments • Don’t protect everything – Protect most important data and services • Small, targeted investments – Pass the Red Face Test – Reduce Investments through integration • Antivirus - Forefront • Full Disk Encryption – Bitlocker – Patch and harden configs – Change default credentials and restrict/monitor privileged accounts – Increase focus on closing the detection and response gap – Secure development through application testing and code reviews – Increase awareness and change culture • Social engineering and phishing • Destroy what you don’t need • Treat all endpoints as hostile • Collapse to cores – Protect cores really, really well • Collect your own metrics and apply security as necessary
  • 39. 39 Moneysec Metrics • You can measure anything! Even intangibles. • You don’t always need to be exact. • Reducing uncertainty adds value. • Having just some data can go a long way to help a decision maker. Source: Douglas Hubbard • Use industry data – You’re not a beautiful snowflake – Apply what correlates • Moneysec metrics – Measure what’s easy – Set targets – Justify as needed – Optimize Cost vs. Target • More metrics: – Moneysec Evolved – Metricon
  • 40. 40 Conclusion Quick attempt to grossly oversimplify the theme: •Billy Beane developed new metrics to win for less. •Use industry security performance data to help prioritize spending to win for less. •Internal information security metrics can be applied along with industry security performance data. •Measure well. Gather evidence. •Determine if you need more or less. •Apply inductive and deductive approaches to make better investments. •Use the evidence you have for better investments.
  • 41. 41 Questions & Answers Phil Agcaoili Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Co-Chair, Communication Sector Coordinating Council (CSCC), Cybersecurity Committee – Technology Sub-Committee Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and Open Certification Framework (OCF) @hacksec https://www.linkedin.com/in/philA